5 Author: Pekka Riikonen <priikone@silcnet.org>
7 Copyright (C) 1997 - 2003 Pekka Riikonen
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; version 2 of the License.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
21 #include "serverincludes.h"
22 #include "server_internal.h"
24 static int silc_server_is_registered(SilcServer server,
25 SilcSocketConnection sock,
26 SilcServerCommandContext cmd,
29 silc_server_command_send_status_reply(SilcServerCommandContext cmd,
34 silc_server_command_send_status_data(SilcServerCommandContext cmd,
39 const unsigned char *arg,
42 silc_server_command_pending_error_check(SilcServerCommandContext cmd,
43 SilcServerCommandReplyContext cmdr,
45 SILC_TASK_CALLBACK(silc_server_command_process_timeout);
47 /* Server command list. */
48 SilcServerCommand silc_command_list[] =
50 SILC_SERVER_CMD(whois, WHOIS, SILC_CF_LAG | SILC_CF_REG),
51 SILC_SERVER_CMD(whowas, WHOWAS, SILC_CF_LAG | SILC_CF_REG),
52 SILC_SERVER_CMD(identify, IDENTIFY, SILC_CF_LAG | SILC_CF_REG),
53 SILC_SERVER_CMD(nick, NICK, SILC_CF_LAG_STRICT | SILC_CF_REG),
54 SILC_SERVER_CMD(list, LIST, SILC_CF_LAG_STRICT | SILC_CF_REG),
55 SILC_SERVER_CMD(topic, TOPIC, SILC_CF_LAG | SILC_CF_REG),
56 SILC_SERVER_CMD(invite, INVITE, SILC_CF_LAG | SILC_CF_REG),
57 SILC_SERVER_CMD(quit, QUIT, SILC_CF_LAG | SILC_CF_REG),
58 SILC_SERVER_CMD(kill, KILL, SILC_CF_LAG_STRICT | SILC_CF_REG | SILC_CF_OPER),
59 SILC_SERVER_CMD(info, INFO, SILC_CF_LAG | SILC_CF_REG),
60 SILC_SERVER_CMD(stats, STATS, SILC_CF_LAG | SILC_CF_REG),
61 SILC_SERVER_CMD(ping, PING, SILC_CF_LAG | SILC_CF_REG),
62 SILC_SERVER_CMD(oper, OPER, SILC_CF_LAG | SILC_CF_REG | SILC_CF_OPER),
63 SILC_SERVER_CMD(join, JOIN, SILC_CF_LAG_STRICT | SILC_CF_REG),
64 SILC_SERVER_CMD(motd, MOTD, SILC_CF_LAG | SILC_CF_REG),
65 SILC_SERVER_CMD(umode, UMODE, SILC_CF_LAG | SILC_CF_REG),
66 SILC_SERVER_CMD(cmode, CMODE, SILC_CF_LAG_STRICT | SILC_CF_REG),
67 SILC_SERVER_CMD(cumode, CUMODE, SILC_CF_LAG | SILC_CF_REG),
68 SILC_SERVER_CMD(kick, KICK, SILC_CF_LAG_STRICT | SILC_CF_REG),
69 SILC_SERVER_CMD(ban, BAN, SILC_CF_LAG_STRICT | SILC_CF_REG),
70 SILC_SERVER_CMD(detach, DETACH, SILC_CF_LAG_STRICT | SILC_CF_REG),
71 SILC_SERVER_CMD(watch, WATCH, SILC_CF_LAG | SILC_CF_REG),
72 SILC_SERVER_CMD(silcoper, SILCOPER,
73 SILC_CF_LAG | SILC_CF_REG | SILC_CF_SILC_OPER),
74 SILC_SERVER_CMD(leave, LEAVE, SILC_CF_LAG_STRICT | SILC_CF_REG),
75 SILC_SERVER_CMD(users, USERS, SILC_CF_LAG | SILC_CF_REG),
76 SILC_SERVER_CMD(getkey, GETKEY, SILC_CF_LAG | SILC_CF_REG),
78 SILC_SERVER_CMD(connect, PRIV_CONNECT,
79 SILC_CF_LAG | SILC_CF_REG | SILC_CF_OPER),
80 SILC_SERVER_CMD(close, PRIV_CLOSE,
81 SILC_CF_LAG | SILC_CF_REG | SILC_CF_OPER),
82 SILC_SERVER_CMD(shutdown, PRIV_SHUTDOWN, SILC_CF_LAG | SILC_CF_REG |
88 /* Performs several checks to the command. It first checks whether this
89 command was called as pending command callback. If it was then it checks
90 whether error occurred in the command reply where the pending command
93 It also checks that the requested command includes correct amount
95 #define SILC_SERVER_COMMAND_CHECK(command, context, min, max) \
99 if (silc_server_command_pending_error_check(cmd, context2, command)) { \
100 SILC_LOG_DEBUG(("Error occurred in command reply, command not called")); \
101 silc_server_command_free(cmd); \
105 _argc = silc_argument_get_arg_num(cmd->args); \
107 SILC_LOG_DEBUG(("Not enough parameters in command")); \
108 silc_server_command_send_status_reply(cmd, command, \
109 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, \
111 silc_server_command_free(cmd); \
115 SILC_LOG_DEBUG(("Too many parameters in command")); \
116 silc_server_command_send_status_reply(cmd, command, \
117 SILC_STATUS_ERR_TOO_MANY_PARAMS, \
119 silc_server_command_free(cmd); \
124 /* Returns TRUE if the connection is registered. Unregistered connections
125 usually cannot send commands hence the check. */
127 static int silc_server_is_registered(SilcServer server,
128 SilcSocketConnection sock,
129 SilcServerCommandContext cmd,
132 SilcIDListData idata = (SilcIDListData)sock->user_data;
137 if (idata->status & SILC_IDLIST_STATUS_REGISTERED)
140 silc_server_command_send_status_reply(cmd, command,
141 SILC_STATUS_ERR_NOT_REGISTERED, 0);
145 /* Internal context to hold data when executed command with timeout. */
147 SilcServerCommandContext ctx;
148 SilcServerCommand *cmd;
149 } *SilcServerCommandTimeout;
151 /* Timeout callback to process commands with timeout for client. Client's
152 commands are always executed with timeout. */
154 SILC_TASK_CALLBACK(silc_server_command_process_timeout)
156 SilcServerCommandTimeout timeout = (SilcServerCommandTimeout)context;
157 SilcClientEntry client = (SilcClientEntry)timeout->ctx->sock->user_data;
160 SILC_LOG_DEBUG(("Client entry is invalid"));
161 silc_server_command_free(timeout->ctx);
166 /* Update access time */
167 client->last_command = time(NULL);
169 if (!(timeout->cmd->flags & SILC_CF_REG)) {
170 SILC_LOG_DEBUG(("Calling %s command",
171 silc_get_command_name(timeout->cmd->cmd)));
172 timeout->cmd->cb(timeout->ctx, NULL);
173 } else if (silc_server_is_registered(timeout->ctx->server,
176 timeout->cmd->cmd)) {
177 SILC_LOG_DEBUG(("Calling %s command",
178 silc_get_command_name(timeout->cmd->cmd)));
179 timeout->cmd->cb(timeout->ctx, NULL);
181 SILC_LOG_DEBUG(("Client is not registered"));
182 silc_server_command_free(timeout->ctx);
188 /* Processes received command packet. */
190 void silc_server_command_process(SilcServer server,
191 SilcSocketConnection sock,
192 SilcPacketContext *packet)
194 SilcServerCommandContext ctx;
195 SilcServerCommand *cmd;
198 /* Allocate command context. This must be free'd by the
199 command routine receiving it. */
200 ctx = silc_server_command_alloc();
201 ctx->server = server;
202 ctx->sock = silc_socket_dup(sock);
203 ctx->packet = silc_packet_context_dup(packet); /* Save original packet */
205 /* Parse the command payload in the packet */
206 ctx->payload = silc_command_payload_parse(packet->buffer->data,
207 packet->buffer->len);
209 SILC_LOG_ERROR(("Bad command payload, packet dropped"));
210 silc_packet_context_free(packet);
211 silc_socket_free(ctx->sock);
215 ctx->args = silc_command_get_args(ctx->payload);
217 /* Get the command */
218 command = silc_command_get(ctx->payload);
219 for (cmd = silc_command_list; cmd->cb; cmd++)
220 if (cmd->cmd == command)
223 if (!cmd || !cmd->cb) {
224 SILC_LOG_DEBUG(("Unknown command %d", command));
225 silc_server_command_send_status_reply(ctx, command,
226 SILC_STATUS_ERR_UNKNOWN_COMMAND, 0);
227 silc_server_command_free(ctx);
231 /* Execute client's commands always with timeout. Normally they are
232 executed with zero (0) timeout but if client is sending command more
233 frequently than once in 2 seconds, then the timeout may be 0 to 2
235 if (sock->type == SILC_SOCKET_TYPE_CLIENT) {
236 SilcClientEntry client = (SilcClientEntry)sock->user_data;
237 SilcServerCommandTimeout timeout;
241 SILC_LOG_DEBUG(("Client entry is invalid"));
242 silc_server_command_free(ctx);
246 timeout = silc_calloc(1, sizeof(*timeout));
250 if (client->last_command && (time(NULL) - client->last_command) < 2) {
251 client->fast_command++;
254 if (client->fast_command - 2 <= 0)
255 client->fast_command = 0;
257 client->fast_command -= 2;
261 if (!fast && ((cmd->flags & SILC_CF_LAG_STRICT) ||
262 (client->fast_command > 5 && cmd->flags & SILC_CF_LAG)))
263 silc_schedule_task_add(server->schedule, sock->sock,
264 silc_server_command_process_timeout, timeout,
265 (client->fast_command < 3 ? 0 :
266 2 - (time(NULL) - client->last_command)),
267 (client->fast_command < 3 ? 200000 : 0),
268 SILC_TASK_TIMEOUT, SILC_TASK_PRI_NORMAL);
270 silc_schedule_task_add(server->schedule, sock->sock,
271 silc_server_command_process_timeout, timeout,
272 0, 1, SILC_TASK_TIMEOUT, SILC_TASK_PRI_NORMAL);
276 /* Execute for server */
278 if (!(cmd->flags & SILC_CF_REG)) {
279 SILC_LOG_DEBUG(("Calling %s command", silc_get_command_name(cmd->cmd)));
281 } else if (silc_server_is_registered(server, sock, ctx, cmd->cmd)) {
282 SILC_LOG_DEBUG(("Calling %s command", silc_get_command_name(cmd->cmd)));
285 SILC_LOG_DEBUG(("Server is not registered"));
286 silc_server_command_free(ctx);
290 /* Allocate Command Context */
292 SilcServerCommandContext silc_server_command_alloc()
294 SilcServerCommandContext ctx = silc_calloc(1, sizeof(*ctx));
299 /* Free's the command context allocated before executing the command */
301 void silc_server_command_free(SilcServerCommandContext ctx)
304 SILC_LOG_DEBUG(("Command context %p refcnt %d->%d", ctx, ctx->users + 1,
306 if (ctx->users < 1) {
308 silc_command_payload_free(ctx->payload);
310 silc_packet_context_free(ctx->packet);
312 silc_socket_free(ctx->sock); /* Decrease reference counter */
317 /* Duplicate Command Context by adding reference counter. The context won't
318 be free'd untill it hits zero. */
320 SilcServerCommandContext
321 silc_server_command_dup(SilcServerCommandContext ctx)
324 SILC_LOG_DEBUG(("Command context %p refcnt %d->%d", ctx, ctx->users - 1,
329 /* Timeout for pending command. If reply to pending command never arrives
330 this is called to free resources. */
332 SILC_TASK_CALLBACK(silc_server_command_pending_timeout)
334 SilcServer server = app_context;
335 SilcServerCommandPending *reply = context;
336 SilcServerCommandReplyContext cmdr;
340 SILC_LOG_DEBUG(("Timeout pending command"));
342 /* Allocate temporary and bogus command reply context */
343 cmdr = silc_calloc(1, sizeof(*cmdr));
344 cmdr->server = server;
345 cmdr->ident = reply->ident;
347 /* Check for pending commands and mark to be exeucted */
349 silc_server_command_pending_check(server, reply->reply_cmd,
350 reply->ident, &cmdr->callbacks_count);
352 /* Create bogus command reply with an error inside */
354 silc_command_reply_payload_encode_va(reply->reply_cmd ? reply->reply_cmd :
355 SILC_COMMAND_RESERVED,
356 SILC_STATUS_ERR_TIMEDOUT, 0,
358 cmdr->payload = silc_command_payload_parse(tmpreply->data, tmpreply->len);
359 silc_buffer_free(tmpreply);
361 /* Call all callbacks. Same as SILC_SERVER_PENDING_EXEC macro. */
362 for (i = 0; i < cmdr->callbacks_count; i++)
363 if (cmdr->callbacks[i].callback)
364 (*cmdr->callbacks[i].callback)(cmdr->callbacks[i].context, cmdr);
366 silc_server_command_pending_del(server, reply->reply_cmd, reply->ident);
367 silc_server_command_reply_free(cmdr);
370 /* Add new pending command to be executed when reply to a command has been
371 received. The `reply_cmd' is the command that will call the `callback'
372 with `context' when reply has been received. It can be SILC_COMMAND_NONE
373 to match any command with the `ident'. If `ident' is non-zero
374 the `callback' will be executed when received reply with command
375 identifier `ident'. If there already exists pending command for the
376 specified command, ident, callback and context this function has no
379 bool silc_server_command_pending(SilcServer server,
380 SilcCommand reply_cmd,
382 SilcCommandCb callback,
385 return silc_server_command_pending_timed(server, reply_cmd, ident, callback,
389 /* Same as silc_server_command_pending with specific timeout for pending
390 commands. If the `timeout' is zero default timeout is used. */
392 bool silc_server_command_pending_timed(SilcServer server,
393 SilcCommand reply_cmd,
395 SilcCommandCb callback,
399 SilcServerCommandPending *reply;
401 /* Check whether identical pending already exists for same command,
402 ident, callback and callback context. If it does then it would be
403 error to register it again. */
404 silc_dlist_start(server->pending_commands);
405 while ((reply = silc_dlist_get(server->pending_commands)) != SILC_LIST_END) {
406 if (reply->reply_cmd == reply_cmd && reply->ident == ident &&
407 reply->callback == callback && reply->context == context)
411 reply = silc_calloc(1, sizeof(*reply));
412 reply->reply_cmd = reply_cmd;
413 reply->ident = ident;
414 reply->context = context;
415 reply->callback = callback;
417 silc_schedule_task_add(server->schedule, 0,
418 silc_server_command_pending_timeout, reply,
419 timeout ? timeout : 10, 0,
420 SILC_TASK_TIMEOUT, SILC_TASK_PRI_LOW);
421 silc_dlist_add(server->pending_commands, reply);
426 /* Deletes pending command by reply command type. */
428 void silc_server_command_pending_del(SilcServer server,
429 SilcCommand reply_cmd,
432 SilcServerCommandPending *r;
434 silc_dlist_start(server->pending_commands);
435 while ((r = silc_dlist_get(server->pending_commands)) != SILC_LIST_END) {
436 if ((r->reply_cmd == reply_cmd || (r->reply_cmd == SILC_COMMAND_NONE &&
438 && r->ident == ident) {
439 silc_dlist_del(server->pending_commands, r);
441 silc_schedule_task_del(server->schedule, r->timeout);
447 /* Checks for pending commands and marks callbacks to be called from
448 the command reply function. Returns TRUE if there were pending command. */
450 SilcServerCommandPendingCallbacks
451 silc_server_command_pending_check(SilcServer server,
454 SilcUInt32 *callbacks_count)
456 SilcServerCommandPending *r;
457 SilcServerCommandPendingCallbacks callbacks = NULL;
460 silc_dlist_start(server->pending_commands);
461 while ((r = silc_dlist_get(server->pending_commands)) != SILC_LIST_END) {
462 if ((r->reply_cmd == command || r->reply_cmd == SILC_COMMAND_NONE)
463 && r->ident == ident) {
464 callbacks = silc_realloc(callbacks, sizeof(*callbacks) * (i + 1));
465 callbacks[i].context = r->context;
466 callbacks[i].callback = r->callback;
467 r->reply_check = TRUE;
472 *callbacks_count = i;
476 /* Sends simple status message as command reply packet */
479 silc_server_command_send_status_reply(SilcServerCommandContext cmd,
486 SILC_LOG_DEBUG(("Sending command status %d", status));
489 silc_command_reply_payload_encode_va(command, status, error,
490 silc_command_get_ident(cmd->payload),
492 silc_server_packet_send(cmd->server, cmd->sock,
493 SILC_PACKET_COMMAND_REPLY, 0,
494 buffer->data, buffer->len, FALSE);
495 silc_buffer_free(buffer);
498 /* Sends command status reply with one extra argument. The argument
499 type must be sent as argument. */
502 silc_server_command_send_status_data(SilcServerCommandContext cmd,
507 const unsigned char *arg,
512 SILC_LOG_DEBUG(("Sending command status %d", status));
515 silc_command_reply_payload_encode_va(command, status, 0,
516 silc_command_get_ident(cmd->payload),
517 1, arg_type, arg, arg_len);
518 silc_server_packet_send(cmd->server, cmd->sock,
519 SILC_PACKET_COMMAND_REPLY, 0,
520 buffer->data, buffer->len, FALSE);
521 silc_buffer_free(buffer);
525 silc_server_command_send_status_data2(SilcServerCommandContext cmd,
529 SilcUInt32 arg_type1,
530 const unsigned char *arg1,
532 SilcUInt32 arg_type2,
533 const unsigned char *arg2,
538 SILC_LOG_DEBUG(("Sending command status %d", status));
541 silc_command_reply_payload_encode_va(command, status, 0,
542 silc_command_get_ident(cmd->payload),
543 2, arg_type1, arg1, arg_len1,
544 arg_type2, arg2, arg_len2);
545 silc_server_packet_send(cmd->server, cmd->sock,
546 SILC_PACKET_COMMAND_REPLY, 0,
547 buffer->data, buffer->len, FALSE);
548 silc_buffer_free(buffer);
551 /* This function can be called to check whether in the command reply
552 an error occurred. This function has no effect if this is called
553 when the command function was not called as pending command callback.
554 This returns TRUE if error had occurred. */
557 silc_server_command_pending_error_check(SilcServerCommandContext cmd,
558 SilcServerCommandReplyContext cmdr,
561 if (!cmd->pending || !cmdr)
564 if (!silc_command_get_status(cmdr->payload, NULL, NULL)) {
567 /* Send the same command reply payload */
568 silc_command_set_command(cmdr->payload, silc_command_get(cmd->payload));
569 silc_command_set_ident(cmdr->payload,
570 silc_command_get_ident(cmd->payload));
571 buffer = silc_command_payload_encode_payload(cmdr->payload);
572 silc_server_packet_send(cmd->server, cmd->sock,
573 SILC_PACKET_COMMAND_REPLY, 0,
574 buffer->data, buffer->len, FALSE);
575 silc_buffer_free(buffer);
582 /* Server side of command WHOIS. */
584 SILC_SERVER_CMD_FUNC(whois)
586 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
587 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_WHOIS, cmd, 1, 256);
588 silc_server_query_command(cmd->server, SILC_COMMAND_WHOIS, cmd);
589 silc_server_command_free(cmd);
592 /* Server side of command WHOWAS. */
594 SILC_SERVER_CMD_FUNC(whowas)
596 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
597 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_WHOWAS, cmd, 1, 2);
598 silc_server_query_command(cmd->server, SILC_COMMAND_WHOWAS, cmd);
599 silc_server_command_free(cmd);
602 /* Server side of command IDENTIFY. */
604 SILC_SERVER_CMD_FUNC(identify)
606 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
607 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_IDENTIFY, cmd, 1, 256);
608 silc_server_query_command(cmd->server, SILC_COMMAND_IDENTIFY, cmd);
609 silc_server_command_free(cmd);
612 /* Server side of command NICK. Sets nickname for user. Setting
613 nickname causes generation of a new client ID for the client. The
614 new client ID is sent to the client after changing the nickname. */
616 SILC_SERVER_CMD_FUNC(nick)
618 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
619 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
620 SilcServer server = cmd->server;
621 SilcBuffer packet, nidp, oidp = NULL;
622 SilcClientID *new_id;
625 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
628 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
631 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_NICK, cmd, 1, 1);
634 nick = silc_argument_get_arg_type(cmd->args, 1, &nick_len);
636 silc_server_command_send_status_reply(cmd, SILC_COMMAND_NICK,
637 SILC_STATUS_ERR_BAD_NICKNAME, 0);
642 if (silc_server_name_bad_chars(nick, nick_len) == TRUE) {
643 silc_server_command_send_status_reply(cmd, SILC_COMMAND_NICK,
644 SILC_STATUS_ERR_BAD_NICKNAME, 0);
648 /* Check for same nickname */
649 if (!strcmp(client->nickname, nick)) {
650 nidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
654 /* Create new Client ID */
655 while (!silc_id_create_client_id(cmd->server, cmd->server->id,
657 cmd->server->md5hash, nick,
661 silc_server_command_send_status_reply(cmd, SILC_COMMAND_NICK,
662 SILC_STATUS_ERR_BAD_NICKNAME, 0);
665 snprintf(&nick[strlen(nick) - 1], 1, "%d", nickfail);
668 /* Send notify about nickname change to our router. We send the new
669 ID and ask to replace it with the old one. If we are router the
670 packet is broadcasted. Send NICK_CHANGE notify. */
671 silc_server_send_notify_nick_change(server, SILC_PRIMARY_ROUTE(server),
672 SILC_BROADCAST(server), client->id,
675 /* Check if anyone is watching the old nickname */
676 if (server->server_type == SILC_ROUTER)
677 silc_server_check_watcher_list(server, client, nick,
678 SILC_NOTIFY_TYPE_NICK_CHANGE);
680 oidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
682 /* Remove old cache entry */
683 silc_idcache_del_by_context(server->local_list->clients, client);
685 silc_free(client->id);
688 silc_free(client->nickname);
689 client->nickname = strdup(nick);
691 /* Update client cache */
692 silc_idcache_add(server->local_list->clients, client->nickname,
693 client->id, (void *)client, 0, NULL);
695 nidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
697 /* Send NICK_CHANGE notify to the client's channels */
698 silc_server_send_notify_on_channels(server, NULL, client,
699 SILC_NOTIFY_TYPE_NICK_CHANGE, 3,
700 oidp->data, oidp->len,
701 nidp->data, nidp->len,
703 strlen(client->nickname));
705 /* Check if anyone is watching the new nickname */
706 if (server->server_type == SILC_ROUTER)
707 silc_server_check_watcher_list(server, client, NULL,
708 SILC_NOTIFY_TYPE_NICK_CHANGE);
711 /* Send the new Client ID as reply command back to client */
712 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_NICK,
713 SILC_STATUS_OK, 0, ident, 2,
714 2, nidp->data, nidp->len,
715 3, nick, strlen(nick));
716 silc_server_packet_send(cmd->server, cmd->sock, SILC_PACKET_COMMAND_REPLY,
717 0, packet->data, packet->len, FALSE);
719 silc_buffer_free(packet);
720 silc_buffer_free(nidp);
722 silc_buffer_free(oidp);
725 silc_server_command_free(cmd);
728 /* Sends the LIST command reply */
731 silc_server_command_list_send_reply(SilcServerCommandContext cmd,
732 SilcChannelEntry *lch,
733 SilcUInt32 lch_count,
734 SilcChannelEntry *gch,
735 SilcUInt32 gch_count)
738 SilcBuffer packet, idp;
739 SilcChannelEntry entry;
741 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
743 unsigned char usercount[4];
745 int valid_lcount = 0, valid_rcount = 0;
747 for (i = 0; i < lch_count; i++) {
748 if (lch[i]->mode & SILC_CHANNEL_MODE_SECRET)
753 for (i = 0; i < gch_count; i++) {
754 if (gch[i]->mode & SILC_CHANNEL_MODE_SECRET)
760 status = SILC_STATUS_OK;
761 if ((lch_count + gch_count) > 1)
762 status = SILC_STATUS_LIST_START;
765 for (i = 0, k = 0; i < lch_count; i++) {
771 status = SILC_STATUS_LIST_ITEM;
772 if (valid_lcount > 1 && k == valid_lcount - 1 && !valid_rcount)
773 status = SILC_STATUS_LIST_END;
775 idp = silc_id_payload_encode(entry->id, SILC_ID_CHANNEL);
777 if (entry->mode & SILC_CHANNEL_MODE_PRIVATE) {
779 memset(usercount, 0, sizeof(usercount));
781 topic = entry->topic;
782 users = silc_hash_table_count(entry->user_list);
783 SILC_PUT32_MSB(users, usercount);
788 silc_command_reply_payload_encode_va(SILC_COMMAND_LIST,
790 2, idp->data, idp->len,
791 3, entry->channel_name,
792 strlen(entry->channel_name),
793 4, topic, topic ? strlen(topic) : 0,
795 silc_server_packet_send(cmd->server, cmd->sock,
796 SILC_PACKET_COMMAND_REPLY, 0, packet->data,
798 silc_buffer_free(packet);
799 silc_buffer_free(idp);
804 for (i = 0, k = 0; i < gch_count; i++) {
810 status = SILC_STATUS_LIST_ITEM;
811 if (valid_rcount > 1 && k == valid_rcount - 1)
812 status = SILC_STATUS_LIST_END;
814 idp = silc_id_payload_encode(entry->id, SILC_ID_CHANNEL);
816 if (entry->mode & SILC_CHANNEL_MODE_PRIVATE) {
818 memset(usercount, 0, sizeof(usercount));
820 topic = entry->topic;
821 users = entry->user_count;
822 SILC_PUT32_MSB(users, usercount);
827 silc_command_reply_payload_encode_va(SILC_COMMAND_LIST,
829 2, idp->data, idp->len,
830 3, entry->channel_name,
831 strlen(entry->channel_name),
832 4, topic, topic ? strlen(topic) : 0,
834 silc_server_packet_send(cmd->server, cmd->sock,
835 SILC_PACKET_COMMAND_REPLY, 0, packet->data,
837 silc_buffer_free(packet);
838 silc_buffer_free(idp);
843 /* Server side of LIST command. This lists the channel of the requested
844 server. Secret channels are not listed. */
846 SILC_SERVER_CMD_FUNC(list)
848 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
849 SilcServer server = cmd->server;
850 SilcChannelID *channel_id = NULL;
853 SilcChannelEntry *lchannels = NULL, *gchannels = NULL;
854 SilcUInt32 lch_count = 0, gch_count = 0;
856 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_LIST, cmd, 0, 1);
858 /* If we are normal server, send the command to router, since we
859 want to know all channels in the network. */
860 if (!cmd->pending && server->server_type != SILC_ROUTER &&
861 !server->standalone) {
863 SilcUInt16 old_ident;
865 old_ident = silc_command_get_ident(cmd->payload);
866 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
867 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
868 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
869 SILC_PACKET_COMMAND, cmd->packet->flags,
870 tmpbuf->data, tmpbuf->len, TRUE);
872 /* Reprocess this packet after received reply from router */
873 silc_server_command_pending(server, SILC_COMMAND_LIST,
874 silc_command_get_ident(cmd->payload),
875 silc_server_command_list,
876 silc_server_command_dup(cmd));
878 silc_command_set_ident(cmd->payload, old_ident);
879 silc_buffer_free(tmpbuf);
884 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
886 channel_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
888 silc_server_command_send_status_reply(cmd, SILC_COMMAND_LIST,
889 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
894 /* Get the channels from local list */
895 lchannels = silc_idlist_get_channels(server->local_list, channel_id,
898 /* Get the channels from global list */
899 gchannels = silc_idlist_get_channels(server->global_list, channel_id,
903 silc_server_command_list_send_reply(cmd, lchannels, lch_count,
904 gchannels, gch_count);
906 silc_free(lchannels);
907 silc_free(gchannels);
910 silc_server_command_free(cmd);
913 /* Server side of TOPIC command. Sets topic for channel and/or returns
914 current topic to client. */
916 SILC_SERVER_CMD_FUNC(topic)
918 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
919 SilcServer server = cmd->server;
920 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
921 SilcChannelID *channel_id;
922 SilcChannelEntry channel;
923 SilcChannelClientEntry chl;
924 SilcBuffer packet, idp;
926 SilcUInt32 argc, tmp_len;
927 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
929 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
932 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_TOPIC, cmd, 1, 2);
934 argc = silc_argument_get_arg_num(cmd->args);
937 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
939 silc_server_command_send_status_reply(cmd, SILC_COMMAND_TOPIC,
940 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
943 channel_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
945 silc_server_command_send_status_reply(cmd, SILC_COMMAND_TOPIC,
946 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
950 /* Check whether the channel exists */
951 channel = silc_idlist_find_channel_by_id(server->local_list,
954 channel = silc_idlist_find_channel_by_id(server->global_list,
957 silc_server_command_send_status_data(cmd, SILC_COMMAND_TOPIC,
958 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
966 tmp = silc_argument_get_arg_type(cmd->args, 2, NULL);
968 silc_server_command_send_status_reply(cmd, SILC_COMMAND_TOPIC,
969 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
974 if (strlen(tmp) > 256) {
975 silc_server_command_send_status_reply(cmd, SILC_COMMAND_TOPIC,
976 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
981 /* See whether the client is on channel and has rights to change topic */
982 if (!silc_server_client_on_channel(client, channel, &chl)) {
983 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
984 silc_server_command_send_status_data(cmd, SILC_COMMAND_TOPIC,
985 SILC_STATUS_ERR_NOT_ON_CHANNEL,
990 if (channel->mode & SILC_CHANNEL_MODE_TOPIC &&
991 !(chl->mode & SILC_CHANNEL_UMODE_CHANOP) &&
992 !(chl->mode & SILC_CHANNEL_UMODE_CHANFO)) {
993 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
994 silc_server_command_send_status_data(cmd, SILC_COMMAND_TOPIC,
995 SILC_STATUS_ERR_NO_CHANNEL_PRIV,
1000 if (!channel->topic || strcmp(channel->topic, tmp)) {
1001 /* Set the topic for channel */
1002 silc_free(channel->topic);
1003 channel->topic = strdup(tmp);
1005 /* Send TOPIC_SET notify type to the network */
1006 silc_server_send_notify_topic_set(server, SILC_PRIMARY_ROUTE(server),
1007 SILC_BROADCAST(server), channel,
1008 client->id, SILC_ID_CLIENT,
1011 /* Send notify about topic change to all clients on the channel */
1012 idp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
1013 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, TRUE,
1014 SILC_NOTIFY_TYPE_TOPIC_SET, 2,
1015 idp->data, idp->len,
1017 strlen(channel->topic));
1018 silc_buffer_free(idp);
1022 /* Send the topic to client as reply packet */
1023 idp = silc_id_payload_encode(channel_id, SILC_ID_CHANNEL);
1024 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_TOPIC,
1025 SILC_STATUS_OK, 0, ident, 2,
1026 2, idp->data, idp->len,
1029 strlen(channel->topic) : 0);
1030 silc_server_packet_send(cmd->server, cmd->sock, SILC_PACKET_COMMAND_REPLY,
1031 0, packet->data, packet->len, FALSE);
1033 silc_buffer_free(packet);
1034 silc_buffer_free(idp);
1035 silc_free(channel_id);
1038 silc_server_command_free(cmd);
1041 /* Server side of INVITE command. Invites some client to join some channel.
1042 This command is also used to manage the invite list of the channel. */
1044 SILC_SERVER_CMD_FUNC(invite)
1046 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1047 SilcServer server = cmd->server;
1048 SilcSocketConnection sock = cmd->sock, dest_sock;
1049 SilcChannelClientEntry chl;
1050 SilcClientEntry sender, dest;
1051 SilcClientID *dest_id = NULL;
1052 SilcChannelEntry channel;
1053 SilcChannelID *channel_id = NULL;
1054 SilcIDListData idata;
1055 SilcArgumentPayload args;
1056 SilcHashTableList htl;
1057 SilcBuffer packet, list, tmp2;
1058 SilcBufferStruct alist;
1059 unsigned char *tmp, *atype = NULL;
1060 SilcUInt32 len, type, len2;
1061 SilcUInt16 argc = 0, ident = silc_command_get_ident(cmd->payload);
1063 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_INVITE, cmd, 1, 4);
1065 /* Get Channel ID */
1066 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
1068 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1069 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
1072 channel_id = silc_id_payload_parse_id(tmp, len, NULL);
1074 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1075 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
1079 /* Get the channel entry */
1080 channel = silc_idlist_find_channel_by_id(server->local_list,
1083 channel = silc_idlist_find_channel_by_id(server->global_list,
1086 silc_server_command_send_status_data(cmd, SILC_COMMAND_INVITE,
1087 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
1093 /* Check whether the sender of this command is on the channel. */
1094 sender = (SilcClientEntry)sock->user_data;
1095 if (!sender || !silc_server_client_on_channel(sender, channel, &chl)) {
1096 silc_server_command_send_status_data(cmd, SILC_COMMAND_INVITE,
1097 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0,
1102 /* Check whether the channel is invite-only channel. If yes then the
1103 sender of this command must be at least channel operator. */
1104 if (channel->mode & SILC_CHANNEL_MODE_INVITE &&
1105 !(chl->mode & SILC_CHANNEL_UMODE_CHANOP) &&
1106 !(chl->mode & SILC_CHANNEL_UMODE_CHANFO)) {
1107 silc_server_command_send_status_data(cmd, SILC_COMMAND_INVITE,
1108 SILC_STATUS_ERR_NO_CHANNEL_PRIV,
1113 /* Get destination client ID */
1114 tmp = silc_argument_get_arg_type(cmd->args, 2, &len);
1118 dest_id = silc_id_payload_parse_id(tmp, len, NULL);
1120 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1121 SILC_STATUS_ERR_NO_CLIENT_ID, 0);
1125 /* Get the client entry */
1126 dest = silc_server_query_client(server, dest_id, FALSE, &resolve);
1128 if (server->server_type != SILC_SERVER || !resolve || cmd->pending) {
1129 silc_server_command_send_status_data(
1130 cmd, SILC_COMMAND_INVITE,
1131 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID, 0,
1136 /* The client info is being resolved. Reprocess this packet after
1137 receiving the reply to the query. */
1138 silc_server_command_pending(server, SILC_COMMAND_WHOIS,
1140 silc_server_command_invite,
1141 silc_server_command_dup(cmd));
1142 cmd->pending = TRUE;
1146 /* Check whether the requested client is already on the channel. */
1147 if (silc_server_client_on_channel(dest, channel, NULL)) {
1148 atype = silc_argument_get_arg_type(cmd->args, 1, &len2);
1149 silc_server_command_send_status_data2(cmd, SILC_COMMAND_INVITE,
1150 SILC_STATUS_ERR_USER_ON_CHANNEL,
1156 /* Get route to the client */
1157 dest_sock = silc_server_get_client_route(server, NULL, 0, dest_id,
1160 silc_server_command_send_status_data(cmd, SILC_COMMAND_INVITE,
1161 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID,
1166 /* Add the client to the invite list */
1168 /* Allocate hash table for invite list if it doesn't exist yet */
1169 if (!channel->invite_list)
1170 channel->invite_list =
1171 silc_hash_table_alloc(0, silc_hash_ptr,
1173 silc_server_inviteban_destruct, channel, TRUE);
1175 /* Check if the ID is in the list already */
1176 silc_hash_table_list(channel->invite_list, &htl);
1177 while (silc_hash_table_get(&htl, (void *)&type, (void *)&tmp2)) {
1178 if (type == 3 && !memcmp(tmp2->data, tmp, len)) {
1183 silc_hash_table_list_reset(&htl);
1185 /* Add new Client ID to invite list */
1187 list = silc_buffer_alloc_size(len);
1188 silc_buffer_put(list, tmp, len);
1189 silc_hash_table_add(channel->invite_list, (void *)3, list);
1192 if (!(dest->mode & SILC_UMODE_BLOCK_INVITE)) {
1193 /* Send notify to the client that is invited to the channel */
1194 SilcBuffer idp, idp2;
1195 idp = silc_id_payload_encode(channel_id, SILC_ID_CHANNEL);
1196 idp2 = silc_id_payload_encode(sender->id, SILC_ID_CLIENT);
1197 silc_server_send_notify_dest(server, dest_sock, FALSE, dest_id,
1199 SILC_NOTIFY_TYPE_INVITE, 3,
1200 idp->data, idp->len,
1201 channel->channel_name,
1202 strlen(channel->channel_name),
1203 idp2->data, idp2->len);
1204 silc_buffer_free(idp);
1205 silc_buffer_free(idp2);
1209 /* Get the invite information */
1210 tmp = silc_argument_get_arg_type(cmd->args, 4, &len2);
1211 if (tmp && len2 > 2) {
1212 /* Parse the arguments to see they are constructed correctly */
1213 SILC_GET16_MSB(argc, tmp);
1214 args = silc_argument_payload_parse(tmp + 2, len2 - 2, argc);
1216 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1217 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
1222 /* Get the type of action */
1223 atype = silc_argument_get_arg_type(cmd->args, 3, &len);
1224 if (atype && len == 1) {
1225 if (atype[0] == 0x00) {
1226 /* Allocate hash table for invite list if it doesn't exist yet */
1227 if (!channel->invite_list)
1228 channel->invite_list =
1229 silc_hash_table_alloc(0, silc_hash_ptr,
1231 silc_server_inviteban_destruct, channel,
1234 /* Check for resource limit */
1235 if (silc_hash_table_count(channel->invite_list) > 64) {
1236 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1237 SILC_STATUS_ERR_RESOURCE_LIMIT,
1243 /* Now add or delete the information. */
1244 silc_server_inviteban_process(server, channel->invite_list,
1245 (SilcUInt8)atype[0], args);
1247 silc_argument_payload_free(args);
1250 /* Encode invite list */
1252 if (channel->invite_list && silc_hash_table_count(channel->invite_list)) {
1253 list = silc_buffer_alloc_size(2);
1254 silc_buffer_format(list,
1255 SILC_STR_UI_SHORT(silc_hash_table_count(
1256 channel->invite_list)),
1258 silc_hash_table_list(channel->invite_list, &htl);
1259 while (silc_hash_table_get(&htl, (void *)&type, (void *)&tmp2))
1260 list = silc_argument_payload_encode_one(list, tmp2->data, tmp2->len,
1262 silc_hash_table_list_reset(&htl);
1265 /* The notify is sent to local servers (not clients), and to network. */
1266 if (atype && tmp && len2) {
1267 silc_buffer_set(&alist, tmp, len2);
1269 /* Send to local servers if we are router */
1270 if (server->server_type == SILC_ROUTER) {
1271 SilcBuffer idp, idp2;
1272 idp = silc_id_payload_encode(channel_id, SILC_ID_CHANNEL);
1273 idp2 = silc_id_payload_encode(sender->id, SILC_ID_CLIENT);
1274 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, FALSE,
1275 SILC_NOTIFY_TYPE_INVITE, 5,
1276 idp->data, idp->len,
1277 channel->channel_name,
1278 strlen(channel->channel_name),
1279 idp2->data, idp2->len,
1281 tmp ? alist.data : NULL,
1282 tmp ? alist.len : 0);
1283 silc_buffer_free(idp);
1284 silc_buffer_free(idp2);
1287 /* Send to network */
1288 silc_server_send_notify_invite(server, SILC_PRIMARY_ROUTE(server),
1289 SILC_BROADCAST(server), channel,
1291 tmp ? &alist : NULL);
1294 /* Send invite list back only if the list was modified, or no arguments
1297 argc = silc_argument_get_arg_num(cmd->args);
1300 if (silc_argument_get_arg_type(cmd->args, 3, &len))
1303 /* Send command reply */
1304 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
1305 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_INVITE,
1306 SILC_STATUS_OK, 0, ident, 2,
1310 type && list ? list->len : 0);
1311 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
1312 packet->data, packet->len, FALSE);
1313 silc_buffer_free(packet);
1314 silc_buffer_free(list);
1318 silc_free(channel_id);
1319 silc_server_command_free(cmd);
1323 SilcSocketConnection sock;
1327 /* Quits connection to client. This gets called if client won't
1328 close the connection even when it has issued QUIT command. */
1330 SILC_TASK_CALLBACK(silc_server_command_quit_cb)
1332 SilcServer server = app_context;
1333 QuitInternal q = (QuitInternal)context;
1335 if (q->sock->user_data) {
1336 /* Free all client specific data, such as client entry and entires
1337 on channels this client may be on. */
1338 silc_server_free_client_data(server, q->sock, q->sock->user_data,
1340 q->sock->user_data = NULL;
1343 if (!SILC_IS_DISCONNECTED(q->sock))
1344 /* Close the connection on our side */
1345 silc_server_close_connection(server, q->sock);
1347 silc_socket_free(q->sock);
1348 silc_free(q->signoff);
1352 /* Quits SILC session. This is the normal way to disconnect client. */
1354 SILC_SERVER_CMD_FUNC(quit)
1356 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1357 SilcServer server = cmd->server;
1358 SilcSocketConnection sock = cmd->sock;
1360 unsigned char *tmp = NULL;
1363 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_QUIT, cmd, 0, 1);
1365 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT)
1369 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
1373 q = silc_calloc(1, sizeof(*q));
1374 q->sock = silc_socket_dup(sock);
1375 q->signoff = tmp ? strdup(tmp) : NULL;
1377 /* We quit the connection with little timeout */
1378 silc_schedule_task_add(server->schedule, sock->sock,
1379 silc_server_command_quit_cb, (void *)q,
1380 0, 200000, SILC_TASK_TIMEOUT, SILC_TASK_PRI_LOW);
1383 silc_server_command_free(cmd);
1386 /* Server side of command KILL. This command is used by router operator
1387 to remove an client from the SILC Network temporarily. */
1389 SILC_SERVER_CMD_FUNC(kill)
1391 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1392 SilcServer server = cmd->server;
1393 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
1394 SilcClientEntry remote_client;
1395 SilcClientID *client_id = NULL;
1396 unsigned char *tmp, *comment, *auth;
1397 SilcUInt32 tmp_len, tmp_len2, auth_len;
1399 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_KILL, cmd, 1, 3);
1401 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
1404 /* Get authentication payload if present */
1405 auth = silc_argument_get_arg_type(cmd->args, 3, &auth_len);
1408 /* Router operator killing */
1410 /* KILL command works only on router */
1411 if (server->server_type != SILC_ROUTER) {
1412 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1413 SILC_STATUS_ERR_NO_ROUTER_PRIV, 0);
1417 /* Check whether client has the permissions. */
1418 if (!(client->mode & SILC_UMODE_ROUTER_OPERATOR)) {
1419 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1420 SILC_STATUS_ERR_NO_ROUTER_PRIV, 0);
1425 /* Get the client ID */
1426 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
1428 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1429 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
1433 client_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
1435 silc_server_command_send_status_data(cmd, SILC_COMMAND_KILL,
1436 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID,
1437 0, 2, tmp, tmp_len);
1441 /* Get the client entry */
1442 remote_client = silc_idlist_find_client_by_id(server->local_list,
1443 client_id, TRUE, NULL);
1444 if (!remote_client) {
1445 remote_client = silc_idlist_find_client_by_id(server->global_list,
1446 client_id, TRUE, NULL);
1447 if (!remote_client) {
1448 silc_server_command_send_status_data(cmd, SILC_COMMAND_KILL,
1449 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID,
1450 0, 2, tmp, tmp_len);
1456 comment = silc_argument_get_arg_type(cmd->args, 2, &tmp_len2);
1457 if (comment && tmp_len2 > 128) {
1459 comment[127] = '\0';
1462 /* If authentication data is provided then verify that killing is
1464 if (auth && auth_len) {
1465 SilcSocketConnection sock;
1467 if (!SILC_IS_LOCAL(remote_client) || !remote_client->data.public_key) {
1468 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1469 SILC_STATUS_ERR_OPERATION_ALLOWED,
1474 /* Verify the signature */
1475 if (!silc_auth_verify_data(auth, auth_len, SILC_AUTH_PUBLIC_KEY,
1476 remote_client->data.public_key, 0,
1477 server->sha1hash, remote_client->id,
1479 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1480 SILC_STATUS_ERR_AUTH_FAILED, 0);
1484 /* Send reply to the sender */
1485 silc_server_command_send_status_data(cmd, SILC_COMMAND_KILL,
1489 /* Do normal signoff for the destination client */
1490 sock = remote_client->connection;
1491 silc_server_remove_from_channels(server, NULL, remote_client,
1492 TRUE, (char *)"Killed", TRUE, TRUE);
1493 silc_server_free_client_data(server, NULL, remote_client, TRUE,
1495 (unsigned char *)"Killed");
1497 silc_server_close_connection(server, sock);
1499 /* Router operator killing */
1501 /* Send reply to the sender */
1502 silc_server_command_send_status_data(cmd, SILC_COMMAND_KILL,
1506 /* Check if anyone is watching this nickname */
1507 if (server->server_type == SILC_ROUTER)
1508 silc_server_check_watcher_list(server, client, NULL,
1509 SILC_NOTIFY_TYPE_KILLED);
1511 /* Now do the killing */
1512 silc_server_kill_client(server, remote_client, comment, client->id,
1517 silc_free(client_id);
1518 silc_server_command_free(cmd);
1521 /* Server side of command INFO. This sends information about us to
1522 the client. If client requested specific server we will send the
1523 command to that server. */
1525 SILC_SERVER_CMD_FUNC(info)
1527 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1528 SilcServer server = cmd->server;
1529 SilcBuffer packet, idp;
1532 char *dest_server, *server_info = NULL, *server_name;
1533 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
1534 SilcServerEntry entry = NULL;
1535 SilcServerID *server_id = NULL;
1537 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_INFO, cmd, 0, 2);
1539 /* Get server name */
1540 dest_server = silc_argument_get_arg_type(cmd->args, 1, NULL);
1543 tmp = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
1545 server_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
1547 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INFO,
1548 SILC_STATUS_ERR_NO_SERVER_ID, 0);
1554 /* Check whether we have this server cached */
1555 entry = silc_idlist_find_server_by_id(server->local_list,
1556 server_id, TRUE, NULL);
1558 entry = silc_idlist_find_server_by_id(server->global_list,
1559 server_id, TRUE, NULL);
1560 if (!entry && server->server_type != SILC_SERVER) {
1561 silc_server_command_send_status_data(cmd, SILC_COMMAND_INFO,
1562 SILC_STATUS_ERR_NO_SUCH_SERVER_ID,
1563 0, 2, tmp, tmp_len);
1569 /* Some buggy servers has sent request to router about themselves. */
1570 if (server->server_type != SILC_SERVER && cmd->sock->user_data == entry)
1573 if ((!dest_server && !server_id && !entry) || (entry &&
1574 entry == server->id_entry) ||
1575 (dest_server && !cmd->pending &&
1576 !strncasecmp(dest_server, server->server_name, strlen(dest_server)))) {
1577 /* Send our reply */
1578 char info_string[256];
1580 memset(info_string, 0, sizeof(info_string));
1581 snprintf(info_string, sizeof(info_string),
1582 "location: %s server: %s admin: %s <%s>",
1583 server->config->server_info->location,
1584 server->config->server_info->server_type,
1585 server->config->server_info->admin,
1586 server->config->server_info->email);
1588 server_info = info_string;
1589 entry = server->id_entry;
1591 /* Check whether we have this server cached */
1592 if (!entry && dest_server) {
1593 entry = silc_idlist_find_server_by_name(server->global_list,
1594 dest_server, TRUE, NULL);
1596 entry = silc_idlist_find_server_by_name(server->local_list,
1597 dest_server, TRUE, NULL);
1601 if (!cmd->pending &&
1602 server->server_type != SILC_SERVER && entry && !entry->server_info) {
1603 /* Send to the server */
1605 SilcUInt16 old_ident;
1607 old_ident = silc_command_get_ident(cmd->payload);
1608 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
1609 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
1611 silc_server_packet_send(server, entry->connection,
1612 SILC_PACKET_COMMAND, cmd->packet->flags,
1613 tmpbuf->data, tmpbuf->len, TRUE);
1615 /* Reprocess this packet after received reply from router */
1616 silc_server_command_pending(server, SILC_COMMAND_INFO,
1617 silc_command_get_ident(cmd->payload),
1618 silc_server_command_info,
1619 silc_server_command_dup(cmd));
1620 cmd->pending = TRUE;
1621 silc_command_set_ident(cmd->payload, old_ident);
1622 silc_buffer_free(tmpbuf);
1626 if (!entry && !cmd->pending && !server->standalone) {
1627 /* Send to the primary router */
1629 SilcUInt16 old_ident;
1631 old_ident = silc_command_get_ident(cmd->payload);
1632 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
1633 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
1635 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
1636 SILC_PACKET_COMMAND, cmd->packet->flags,
1637 tmpbuf->data, tmpbuf->len, TRUE);
1639 /* Reprocess this packet after received reply from router */
1640 silc_server_command_pending(server, SILC_COMMAND_INFO,
1641 silc_command_get_ident(cmd->payload),
1642 silc_server_command_info,
1643 silc_server_command_dup(cmd));
1644 cmd->pending = TRUE;
1645 silc_command_set_ident(cmd->payload, old_ident);
1646 silc_buffer_free(tmpbuf);
1651 silc_free(server_id);
1655 silc_server_command_send_status_data(cmd, SILC_COMMAND_INFO,
1656 SILC_STATUS_ERR_NO_SUCH_SERVER, 0,
1658 strlen(dest_server));
1662 idp = silc_id_payload_encode(entry->id, SILC_ID_SERVER);
1664 server_info = entry->server_info;
1665 server_name = entry->server_name;
1667 /* Send the reply */
1668 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_INFO,
1669 SILC_STATUS_OK, 0, ident, 3,
1670 2, idp->data, idp->len,
1672 strlen(server_name),
1675 strlen(server_info) : 0);
1676 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
1677 packet->data, packet->len, FALSE);
1679 silc_buffer_free(packet);
1680 silc_buffer_free(idp);
1683 silc_server_command_free(cmd);
1686 /* Server side of command PING. This just replies to the ping. */
1688 SILC_SERVER_CMD_FUNC(ping)
1690 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1691 SilcServer server = cmd->server;
1694 SilcServerID *server_id = NULL;
1696 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_PING, cmd, 1, 1);
1699 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
1701 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PING,
1702 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
1706 server_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
1710 if (SILC_ID_SERVER_COMPARE(server_id, server->id)) {
1711 /* Send our reply */
1712 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PING,
1715 silc_server_command_send_status_data(cmd, SILC_COMMAND_PING,
1716 SILC_STATUS_ERR_NO_SUCH_SERVER_ID, 0,
1722 silc_free(server_id);
1723 silc_server_command_free(cmd);
1726 /* Server side of command STATS. */
1728 SILC_SERVER_CMD_FUNC(stats)
1730 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1731 SilcServer server = cmd->server;
1732 SilcServerID *server_id;
1735 SilcBuffer packet, stats;
1736 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
1739 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_STATS, cmd, 1, 1);
1742 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
1744 silc_server_command_send_status_reply(cmd, SILC_COMMAND_STATS,
1745 SILC_STATUS_ERR_NO_SERVER_ID, 0);
1748 server_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
1752 /* The ID must be ours */
1753 if (!SILC_ID_SERVER_COMPARE(server->id, server_id)) {
1754 silc_server_command_send_status_data(cmd, SILC_COMMAND_STATS,
1755 SILC_STATUS_ERR_NO_SUCH_SERVER_ID, 0,
1757 silc_free(server_id);
1760 silc_free(server_id);
1762 /* If we are router then just send everything we got. If we are normal
1763 server then we'll send this to our router to get all the latest
1764 statistical information. */
1765 if (!cmd->pending && server->server_type != SILC_ROUTER &&
1766 !server->standalone) {
1767 /* Send request to our router */
1768 SilcBuffer idp = silc_id_payload_encode(server->router->id,
1770 packet = silc_command_payload_encode_va(SILC_COMMAND_STATS,
1771 ++server->cmd_ident, 1,
1772 1, idp->data, idp->len);
1773 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
1774 SILC_PACKET_COMMAND, 0, packet->data,
1775 packet->len, FALSE);
1777 /* Reprocess this packet after received reply from router */
1778 silc_server_command_pending(server, SILC_COMMAND_STATS,
1780 silc_server_command_stats,
1781 silc_server_command_dup(cmd));
1782 cmd->pending = TRUE;
1783 silc_buffer_free(packet);
1784 silc_buffer_free(idp);
1788 /* Send our reply to sender */
1789 uptime = time(NULL) - server->starttime;
1791 stats = silc_buffer_alloc_size(60);
1792 silc_buffer_format(stats,
1793 SILC_STR_UI_INT(server->starttime),
1794 SILC_STR_UI_INT(uptime),
1795 SILC_STR_UI_INT(server->stat.my_clients),
1796 SILC_STR_UI_INT(server->stat.my_channels),
1797 SILC_STR_UI_INT(server->stat.my_server_ops),
1798 SILC_STR_UI_INT(server->stat.my_router_ops),
1799 SILC_STR_UI_INT(server->stat.cell_clients),
1800 SILC_STR_UI_INT(server->stat.cell_channels),
1801 SILC_STR_UI_INT(server->stat.cell_servers),
1802 SILC_STR_UI_INT(server->stat.clients),
1803 SILC_STR_UI_INT(server->stat.channels),
1804 SILC_STR_UI_INT(server->stat.servers),
1805 SILC_STR_UI_INT(server->stat.routers),
1806 SILC_STR_UI_INT(server->stat.server_ops),
1807 SILC_STR_UI_INT(server->stat.router_ops),
1810 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_STATS,
1811 SILC_STATUS_OK, 0, ident, 2,
1813 3, stats->data, stats->len);
1814 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY,
1815 0, packet->data, packet->len, FALSE);
1816 silc_buffer_free(packet);
1817 silc_buffer_free(stats);
1820 silc_server_command_free(cmd);
1823 /* Internal routine to join channel. The channel sent to this function
1824 has been either created or resolved from ID lists. This joins the sent
1825 client to the channel. */
1827 static void silc_server_command_join_channel(SilcServer server,
1828 SilcServerCommandContext cmd,
1829 SilcChannelEntry channel,
1830 SilcClientID *client_id,
1834 const unsigned char *auth,
1835 SilcUInt32 auth_len,
1836 const unsigned char *cauth,
1837 SilcUInt32 cauth_len)
1839 SilcSocketConnection sock = cmd->sock;
1841 SilcUInt32 tmp_len, user_count;
1842 unsigned char *passphrase = NULL, mode[4], tmp2[4], tmp3[4];
1843 SilcClientEntry client;
1844 SilcChannelClientEntry chl;
1845 SilcBuffer reply, chidp, clidp, keyp = NULL;
1846 SilcBuffer user_list, mode_list, invite_list, ban_list;
1847 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
1848 char check[512], check2[512];
1849 bool founder = FALSE;
1851 SilcBuffer fkey = NULL, chpklist = NULL;
1854 SILC_LOG_DEBUG(("Joining client to channel"));
1859 /* Get the client entry */
1860 if (cmd->sock->type == SILC_SOCKET_TYPE_CLIENT) {
1861 client = (SilcClientEntry)sock->user_data;
1865 client = silc_server_query_client(server, client_id, FALSE,
1868 if (!resolve || cmd->pending) {
1869 silc_server_command_send_status_reply(
1870 cmd, SILC_COMMAND_JOIN,
1871 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
1875 /* The client info is being resolved. Reprocess this packet after
1876 receiving the reply to the query. */
1877 silc_server_command_pending(server, SILC_COMMAND_WHOIS,
1879 silc_server_command_join,
1880 silc_server_command_dup(cmd));
1881 cmd->pending = TRUE;
1885 if (!client->data.public_key &&
1886 (auth || cauth || channel->ban_list ||
1887 (channel->mode & SILC_CHANNEL_MODE_INVITE))) {
1888 if (cmd->pending == 2)
1891 /* We must retrieve the client's public key by sending
1892 GETKEY command. Reprocess this packet after receiving the key */
1893 clidp = silc_id_payload_encode(client_id, SILC_ID_CLIENT);
1894 silc_server_send_command(server, cmd->sock,
1895 SILC_COMMAND_GETKEY, ++server->cmd_ident,
1896 1, 1, clidp->data, clidp->len);
1897 silc_buffer_free(clidp);
1898 silc_server_command_pending(server, SILC_COMMAND_GETKEY,
1900 silc_server_command_join,
1901 silc_server_command_dup(cmd));
1906 cmd->pending = FALSE;
1910 * Check founder auth payload if provided. If client can gain founder
1911 * privileges it can override various conditions on joining the channel,
1912 * and can have directly the founder mode set on the channel.
1914 if (auth && auth_len && channel->mode & SILC_CHANNEL_MODE_FOUNDER_AUTH) {
1915 SilcIDListData idata = (SilcIDListData)client;
1916 SilcChannelClientEntry chl2;
1917 SilcHashTableList htl;
1919 if (channel->founder_key && idata->public_key &&
1920 silc_pkcs_public_key_compare(channel->founder_key,
1921 idata->public_key)) {
1922 /* Check whether the client is to become founder */
1923 if (silc_auth_verify_data(auth, auth_len, SILC_AUTH_PUBLIC_KEY,
1924 channel->founder_key, 0, server->sha1hash,
1925 client->id, SILC_ID_CLIENT)) {
1927 /* There cannot be anyone else as founder on the channel now. This
1928 client is definitely the founder due to this authentication */
1929 silc_hash_table_list(channel->user_list, &htl);
1930 while (silc_hash_table_get(&htl, NULL, (void *)&chl2))
1931 if (chl2->mode & SILC_CHANNEL_UMODE_CHANFO) {
1932 chl2->mode &= ~SILC_CHANNEL_UMODE_CHANFO;
1933 silc_server_force_cumode_change(server, NULL, channel, chl2,
1937 silc_hash_table_list_reset(&htl);
1939 umode = (SILC_CHANNEL_UMODE_CHANOP | SILC_CHANNEL_UMODE_CHANFO);
1946 * Check channel modes
1950 memset(check, 0, sizeof(check));
1951 memset(check2, 0, sizeof(check2));
1952 silc_strncat(check, sizeof(check),
1953 client->nickname, strlen(client->nickname));
1954 silc_strncat(check, sizeof(check), "!", 1);
1955 silc_strncat(check, sizeof(check),
1956 client->username, strlen(client->username));
1957 if (!strchr(client->username, '@')) {
1958 silc_strncat(check, sizeof(check), "@", 1);
1959 silc_strncat(check, sizeof(check),
1960 cmd->sock->hostname, strlen(cmd->sock->hostname));
1963 silc_strncat(check2, sizeof(check2),
1964 client->nickname, strlen(client->nickname));
1965 if (!strchr(client->nickname, '@')) {
1966 silc_strncat(check2, sizeof(check2), "@", 1);
1967 silc_strncat(check2, sizeof(check2),
1968 server->server_name, strlen(server->server_name));
1970 silc_strncat(check2, sizeof(check2), "!", 1);
1971 silc_strncat(check2, sizeof(check2),
1972 client->username, strlen(client->username));
1973 if (!strchr(client->username, '@')) {
1974 silc_strncat(check2, sizeof(check2), "@", 1);
1975 silc_strncat(check2, sizeof(check2),
1976 cmd->sock->hostname, strlen(cmd->sock->hostname));
1979 /* Check invite list if channel is invite-only channel */
1980 if (channel->mode & SILC_CHANNEL_MODE_INVITE) {
1981 if (!channel->invite_list ||
1982 !silc_hash_table_count(channel->invite_list) ||
1983 (!silc_server_inviteban_match(server, channel->invite_list,
1985 !silc_server_inviteban_match(server, channel->invite_list,
1986 2, client->data.public_key) &&
1987 !silc_server_inviteban_match(server, channel->invite_list,
1988 1, client->nickname) &&
1989 !silc_server_inviteban_match(server, channel->invite_list,
1991 !silc_server_inviteban_match(server, channel->invite_list,
1993 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
1994 silc_server_command_send_status_data(cmd, SILC_COMMAND_JOIN,
1995 SILC_STATUS_ERR_NOT_INVITED, 0,
1996 2, chidp->data, chidp->len);
1997 silc_buffer_free(chidp);
2002 /* Check ban list if it exists. If the client's nickname, server,
2003 username and/or hostname is in the ban list the access to the
2004 channel is denied. */
2005 if (channel->ban_list && silc_hash_table_count(channel->ban_list)) {
2006 if (silc_server_inviteban_match(server, channel->ban_list,
2008 silc_server_inviteban_match(server, channel->ban_list,
2009 2, client->data.public_key) ||
2010 silc_server_inviteban_match(server, channel->ban_list,
2011 1, client->nickname) ||
2012 silc_server_inviteban_match(server, channel->ban_list,
2014 silc_server_inviteban_match(server, channel->ban_list,
2016 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
2017 silc_server_command_send_status_data(
2018 cmd, SILC_COMMAND_JOIN,
2019 SILC_STATUS_ERR_BANNED_FROM_CHANNEL, 0,
2020 2, chidp->data, chidp->len);
2021 silc_buffer_free(chidp);
2026 /* Check user count limit if set. */
2027 if (channel->mode & SILC_CHANNEL_MODE_ULIMIT) {
2028 if (silc_hash_table_count(channel->user_list) + 1 >
2029 channel->user_limit) {
2030 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
2031 silc_server_command_send_status_data(cmd, SILC_COMMAND_JOIN,
2032 SILC_STATUS_ERR_CHANNEL_IS_FULL,
2033 0, 2, chidp->data, chidp->len);
2034 silc_buffer_free(chidp);
2040 /* Check the channel passphrase if set. */
2041 if (channel->mode & SILC_CHANNEL_MODE_PASSPHRASE) {
2042 /* Get passphrase */
2043 tmp = silc_argument_get_arg_type(cmd->args, 3, &tmp_len);
2045 passphrase = silc_memdup(tmp, tmp_len);
2047 if (!passphrase || !channel->passphrase ||
2048 memcmp(passphrase, channel->passphrase, strlen(channel->passphrase))) {
2049 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
2050 silc_server_command_send_status_data(cmd, SILC_COMMAND_JOIN,
2051 SILC_STATUS_ERR_BAD_PASSWORD, 0,
2052 2, chidp->data, chidp->len);
2053 silc_buffer_free(chidp);
2058 /* Verify channel authentication with channel public keys if set. */
2059 if (channel->mode & SILC_CHANNEL_MODE_CHANNEL_AUTH) {
2060 if (!silc_server_verify_channel_auth(server, channel, client->id,
2061 cauth, cauth_len)) {
2062 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2063 SILC_STATUS_ERR_PERM_DENIED, 0);
2069 * Client is allowed to join to the channel. Make it happen.
2072 /* Check whether the client already is on the channel */
2073 if (silc_server_client_on_channel(client, channel, NULL)) {
2074 clidp = silc_id_payload_encode(client_id, SILC_ID_CLIENT);
2075 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
2076 silc_server_command_send_status_data2(cmd, SILC_COMMAND_JOIN,
2077 SILC_STATUS_ERR_USER_ON_CHANNEL, 0,
2078 2, clidp->data, clidp->len,
2079 3, chidp->data, chidp->len);
2080 silc_buffer_free(clidp);
2081 silc_buffer_free(chidp);
2085 /* Generate new channel key as protocol dictates */
2087 if (!silc_server_create_channel_key(server, channel, 0))
2090 /* Send the channel key. This is broadcasted to the channel but is not
2091 sent to the client who is joining to the channel. */
2092 if (!(channel->mode & SILC_CHANNEL_MODE_PRIVKEY))
2093 silc_server_send_channel_key(server, NULL, channel,
2094 server->server_type == SILC_ROUTER ?
2095 FALSE : !server->standalone);
2098 /* Join the client to the channel by adding it to channel's user list.
2099 Add also the channel to client entry's channels list for fast cross-
2101 chl = silc_calloc(1, sizeof(*chl));
2103 chl->client = client;
2104 chl->channel = channel;
2105 silc_hash_table_add(channel->user_list, client, chl);
2106 silc_hash_table_add(client->channels, channel, chl);
2107 channel->user_count++;
2108 channel->disabled = FALSE;
2110 /* Get users on the channel */
2111 silc_server_get_users_on_channel(server, channel, &user_list, &mode_list,
2114 /* Encode Client ID Payload of the original client who wants to join */
2115 clidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
2117 /* Encode command reply packet */
2118 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
2119 SILC_PUT32_MSB(channel->mode, mode);
2120 SILC_PUT32_MSB(created, tmp2);
2121 SILC_PUT32_MSB(user_count, tmp3);
2123 if (!(channel->mode & SILC_CHANNEL_MODE_PRIVKEY)) {
2124 tmp = silc_id_id2str(channel->id, SILC_ID_CHANNEL);
2125 cipher = silc_cipher_get_name(channel->channel_key);
2126 keyp = silc_channel_key_payload_encode(silc_id_get_len(channel->id,
2129 strlen(cipher), cipher,
2130 channel->key_len / 8, channel->key);
2134 if (channel->founder_key)
2135 fkey = silc_pkcs_public_key_payload_encode(channel->founder_key);
2137 /* Encode invite list */
2139 if (channel->invite_list && silc_hash_table_count(channel->invite_list)) {
2140 SilcHashTableList htl;
2142 invite_list = silc_buffer_alloc_size(2);
2143 silc_buffer_format(invite_list,
2144 SILC_STR_UI_SHORT(silc_hash_table_count(
2145 channel->invite_list)),
2148 silc_hash_table_list(channel->invite_list, &htl);
2149 while (silc_hash_table_get(&htl, (void *)&tmp_len, (void *)&reply))
2150 invite_list = silc_argument_payload_encode_one(invite_list,
2152 reply->len, tmp_len);
2153 silc_hash_table_list_reset(&htl);
2156 /* Encode ban list */
2158 if (channel->ban_list && silc_hash_table_count(channel->ban_list)) {
2159 SilcHashTableList htl;
2161 ban_list = silc_buffer_alloc_size(2);
2162 silc_buffer_format(ban_list,
2163 SILC_STR_UI_SHORT(silc_hash_table_count(
2164 channel->ban_list)),
2167 silc_hash_table_list(channel->ban_list, &htl);
2168 while (silc_hash_table_get(&htl, (void *)&tmp_len, (void *)&reply))
2169 ban_list = silc_argument_payload_encode_one(ban_list,
2171 reply->len, tmp_len);
2172 silc_hash_table_list_reset(&htl);
2175 if (channel->channel_pubkeys)
2176 chpklist = silc_server_get_channel_pk_list(server, channel, FALSE, FALSE);
2179 silc_command_reply_payload_encode_va(SILC_COMMAND_JOIN,
2180 SILC_STATUS_OK, 0, ident, 15,
2181 2, channel->channel_name,
2182 strlen(channel->channel_name),
2183 3, chidp->data, chidp->len,
2184 4, clidp->data, clidp->len,
2187 7, keyp ? keyp->data : NULL,
2188 keyp ? keyp->len : 0,
2189 8, ban_list ? ban_list->data : NULL,
2190 ban_list ? ban_list->len : 0,
2191 9, invite_list ? invite_list->data :
2193 invite_list ? invite_list->len : 0,
2196 strlen(channel->topic) : 0,
2197 11, silc_hmac_get_name(channel->hmac),
2198 strlen(silc_hmac_get_name(channel->
2201 13, user_list->data, user_list->len,
2202 14, mode_list->data,
2204 15, fkey ? fkey->data : NULL,
2205 fkey ? fkey->len : 0,
2206 16, chpklist ? chpklist->data : NULL,
2207 chpklist ? chpklist->len : 0);
2209 /* Send command reply */
2210 silc_server_packet_send(server, sock, SILC_PACKET_COMMAND_REPLY, 0,
2211 reply->data, reply->len, FALSE);
2213 /* Send JOIN notify to locally connected clients on the channel. If
2214 we are normal server then router will send or have sent JOIN notify
2215 already. However since we've added the client already to our channel
2216 we'll ignore it (in packet_receive.c) so we must send it here. If
2217 we are router then this will send it to local clients and local
2219 SILC_LOG_DEBUG(("Send JOIN notify to channel"));
2220 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, TRUE,
2221 SILC_NOTIFY_TYPE_JOIN, 2,
2222 clidp->data, clidp->len,
2223 chidp->data, chidp->len);
2225 /* Update statistics */
2226 server->stat.my_chanclients++;
2227 if (server->server_type == SILC_ROUTER) {
2228 server->stat.cell_chanclients++;
2229 server->stat.chanclients++;
2232 if (!cmd->pending) {
2233 /* Send JOIN notify packet to our primary router */
2234 silc_server_send_notify_join(server, SILC_PRIMARY_ROUTE(server),
2235 SILC_BROADCAST(server), channel, client->id);
2238 /* Distribute the channel key to all backup routers. */
2239 silc_server_backup_send(server, NULL, SILC_PACKET_CHANNEL_KEY, 0,
2240 keyp->data, keyp->len, FALSE, TRUE);
2242 /* If client became founder by providing correct founder auth data
2243 notify the mode change to the channel. */
2245 SILC_PUT32_MSB(chl->mode, mode);
2246 SILC_LOG_DEBUG(("Send CUMODE_CHANGE notify to channel"));
2247 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, TRUE,
2248 SILC_NOTIFY_TYPE_CUMODE_CHANGE, 4,
2249 clidp->data, clidp->len,
2250 mode, 4, clidp->data, clidp->len,
2251 fkey ? fkey->data : NULL,
2252 fkey ? fkey->len : 0);
2256 /* Set CUMODE notify type to network */
2258 silc_server_send_notify_cumode(server, SILC_PRIMARY_ROUTE(server),
2259 SILC_BROADCAST(server), channel,
2260 chl->mode, client->id, SILC_ID_CLIENT,
2261 client->id, channel->founder_key);
2263 silc_buffer_free(reply);
2264 silc_buffer_free(clidp);
2265 silc_buffer_free(chidp);
2266 silc_buffer_free(keyp);
2267 silc_buffer_free(user_list);
2268 silc_buffer_free(mode_list);
2269 silc_buffer_free(fkey);
2270 silc_buffer_free(chpklist);
2271 silc_buffer_free(invite_list);
2272 silc_buffer_free(ban_list);
2276 memset(passphrase, 0, strlen(passphrase));
2277 silc_free(passphrase);
2280 /* Server side of command JOIN. Joins client into requested channel. If
2281 the channel does not exist it will be created. */
2283 SILC_SERVER_CMD_FUNC(join)
2285 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
2286 SilcServer server = cmd->server;
2287 unsigned char *auth, *cauth;
2288 SilcUInt32 tmp_len, auth_len, cauth_len;
2289 char *tmp, *channel_name = NULL, *cipher, *hmac;
2290 SilcChannelEntry channel;
2291 SilcUInt32 umode = 0;
2292 bool created = FALSE, create_key = TRUE;
2293 SilcClientID *client_id;
2295 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_JOIN, cmd, 2, 7);
2297 /* Get channel name */
2298 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
2300 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2301 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
2308 channel_name[255] = '\0';
2310 if (silc_server_name_bad_chchars(channel_name, tmp_len) == TRUE) {
2311 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2312 SILC_STATUS_ERR_BAD_CHANNEL, 0);
2316 /* Get Client ID of the client who is joining to the channel */
2317 tmp = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
2319 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2320 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
2324 client_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
2326 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2327 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
2332 /* Get cipher, hmac name and auth payload */
2333 cipher = silc_argument_get_arg_type(cmd->args, 4, NULL);
2334 hmac = silc_argument_get_arg_type(cmd->args, 5, NULL);
2335 auth = silc_argument_get_arg_type(cmd->args, 6, &auth_len);
2336 cauth = silc_argument_get_arg_type(cmd->args, 7, &cauth_len);
2338 /* See if the channel exists */
2339 channel = silc_idlist_find_channel_by_name(server->local_list,
2340 channel_name, NULL);
2342 if (cmd->sock->type == SILC_SOCKET_TYPE_CLIENT) {
2343 SilcClientEntry entry = (SilcClientEntry)cmd->sock->user_data;
2345 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2346 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
2351 silc_free(client_id);
2352 client_id = silc_id_dup(entry->id, SILC_ID_CLIENT);
2355 (channel->disabled && server->server_type != SILC_ROUTER)) {
2356 /* Channel not found or not valid */
2358 /* If we are standalone server we don't have a router, we just create
2359 the channel by ourselves (unless it existed). */
2360 if (server->standalone) {
2362 channel = silc_server_create_new_channel(server, server->id, cipher,
2363 hmac, channel_name, TRUE);
2365 silc_server_command_send_status_data(
2366 cmd, SILC_COMMAND_JOIN,
2367 SILC_STATUS_ERR_UNKNOWN_ALGORITHM,
2368 0, 2, cipher, strlen(cipher));
2369 silc_free(client_id);
2373 umode = (SILC_CHANNEL_UMODE_CHANOP | SILC_CHANNEL_UMODE_CHANFO);
2379 /* The channel does not exist on our server. If we are normal server
2380 we will send JOIN command to our router which will handle the
2381 joining procedure (either creates the channel if it doesn't exist
2382 or joins the client to it). */
2383 if (server->server_type != SILC_ROUTER) {
2385 SilcUInt16 old_ident;
2387 /* If this is pending command callback then we've resolved
2388 it and it didn't work, return since we've notified the
2389 client already in the command reply callback. */
2391 silc_free(client_id);
2395 old_ident = silc_command_get_ident(cmd->payload);
2396 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
2397 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
2399 /* Send JOIN command to our router */
2400 silc_server_packet_send(server, (SilcSocketConnection)
2401 SILC_PRIMARY_ROUTE(server),
2402 SILC_PACKET_COMMAND, cmd->packet->flags,
2403 tmpbuf->data, tmpbuf->len, TRUE);
2405 /* Reprocess this packet after received reply from router */
2406 silc_server_command_pending(server, SILC_COMMAND_JOIN,
2407 silc_command_get_ident(cmd->payload),
2408 silc_server_command_join,
2409 silc_server_command_dup(cmd));
2410 cmd->pending = TRUE;
2411 silc_command_set_ident(cmd->payload, old_ident);
2412 silc_buffer_free(tmpbuf);
2413 silc_free(client_id);
2417 /* We are router and the channel does not seem exist so we will check
2418 our global list as well for the channel. */
2419 channel = silc_idlist_find_channel_by_name(server->global_list,
2420 channel_name, NULL);
2422 /* Channel really does not exist, create it */
2423 channel = silc_server_create_new_channel(server, server->id, cipher,
2424 hmac, channel_name, TRUE);
2426 silc_server_command_send_status_data(
2427 cmd, SILC_COMMAND_JOIN,
2428 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
2429 2, cipher, strlen(cipher));
2430 silc_free(client_id);
2434 umode = (SILC_CHANNEL_UMODE_CHANOP | SILC_CHANNEL_UMODE_CHANFO);
2442 /* Channel not found */
2444 /* If the command came from router and we are normal server then
2445 something went wrong with the joining as the channel was not found.
2446 We can't do anything else but ignore this. */
2447 if (cmd->sock->type == SILC_SOCKET_TYPE_ROUTER ||
2448 server->server_type != SILC_ROUTER) {
2449 silc_free(client_id);
2453 /* We are router and the channel does not seem exist so we will check
2454 our global list as well for the channel. */
2455 channel = silc_idlist_find_channel_by_name(server->global_list,
2456 channel_name, NULL);
2458 /* Channel really does not exist, create it */
2459 channel = silc_server_create_new_channel(server, server->id, cipher,
2460 hmac, channel_name, TRUE);
2462 silc_server_command_send_status_data(
2463 cmd, SILC_COMMAND_JOIN,
2464 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
2465 2, cipher, strlen(cipher));
2466 silc_free(client_id);
2470 umode = (SILC_CHANNEL_UMODE_CHANOP | SILC_CHANNEL_UMODE_CHANFO);
2477 /* Check whether the channel was created by our router */
2478 if (cmd->pending && context2) {
2479 SilcServerCommandReplyContext reply = context2;
2481 if (silc_command_get(reply->payload) == SILC_COMMAND_JOIN) {
2482 tmp = silc_argument_get_arg_type(reply->args, 6, NULL);
2483 SILC_GET32_MSB(created, tmp);
2484 if (silc_argument_get_arg_type(reply->args, 7, NULL))
2485 create_key = FALSE; /* Router returned the key already */
2487 if (silc_command_get_status(reply->payload, NULL, NULL) &&
2488 channel->mode & SILC_CHANNEL_MODE_PASSPHRASE) {
2489 /* Save channel passphrase, if user provided it successfully */
2492 pa = silc_argument_get_arg_type(cmd->args, 3, &pa_len);
2494 silc_free(channel->passphrase);
2495 channel->passphrase = silc_memdup(pa, pa_len);
2500 if (silc_command_get(reply->payload) == SILC_COMMAND_WHOIS &&
2501 !channel->disabled && !silc_hash_table_count(channel->user_list))
2505 /* If the channel does not have global users and is also empty the client
2506 will be the channel founder and operator. */
2507 if (!channel->disabled &&
2508 !channel->global_users && !silc_hash_table_count(channel->user_list))
2509 umode = (SILC_CHANNEL_UMODE_CHANOP | SILC_CHANNEL_UMODE_CHANFO);
2511 /* Join to the channel */
2512 silc_server_command_join_channel(server, cmd, channel, client_id,
2513 created, create_key, umode,
2514 auth, auth_len, cauth, cauth_len);
2516 silc_free(client_id);
2519 silc_server_command_free(cmd);
2522 /* Server side of command MOTD. Sends server's current "message of the
2523 day" to the client. */
2525 SILC_SERVER_CMD_FUNC(motd)
2527 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
2528 SilcServer server = cmd->server;
2529 SilcBuffer packet, idp;
2530 char *motd, *dest_server;
2531 SilcUInt32 motd_len;
2532 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
2534 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_MOTD, cmd, 1, 1);
2536 /* Get server name */
2537 dest_server = silc_argument_get_arg_type(cmd->args, 1, NULL);
2539 silc_server_command_send_status_reply(cmd, SILC_COMMAND_MOTD,
2540 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
2545 if (!strncasecmp(dest_server, server->server_name, strlen(dest_server))) {
2548 idp = silc_id_payload_encode(server->id_entry->id, SILC_ID_SERVER);
2550 if (server->config && server->config->server_info &&
2551 server->config->server_info->motd_file) {
2553 motd = silc_file_readfile(server->config->server_info->motd_file,
2559 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_MOTD,
2566 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_MOTD,
2572 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
2573 packet->data, packet->len, FALSE);
2574 silc_buffer_free(packet);
2575 silc_buffer_free(idp);
2577 SilcServerEntry entry;
2579 /* Check whether we have this server cached */
2580 entry = silc_idlist_find_server_by_name(server->global_list,
2581 dest_server, TRUE, NULL);
2583 entry = silc_idlist_find_server_by_name(server->local_list,
2584 dest_server, TRUE, NULL);
2587 if (server->server_type != SILC_SERVER && !cmd->pending &&
2588 entry && !entry->motd) {
2589 /* Send to the server */
2591 SilcUInt16 old_ident;
2593 old_ident = silc_command_get_ident(cmd->payload);
2594 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
2595 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
2597 silc_server_packet_send(server, entry->connection,
2598 SILC_PACKET_COMMAND, cmd->packet->flags,
2599 tmpbuf->data, tmpbuf->len, TRUE);
2601 /* Reprocess this packet after received reply from router */
2602 silc_server_command_pending(server, SILC_COMMAND_MOTD,
2603 silc_command_get_ident(cmd->payload),
2604 silc_server_command_motd,
2605 silc_server_command_dup(cmd));
2606 cmd->pending = TRUE;
2607 silc_command_set_ident(cmd->payload, old_ident);
2608 silc_buffer_free(tmpbuf);
2612 if (!entry && !cmd->pending && !server->standalone) {
2613 /* Send to the primary router */
2615 SilcUInt16 old_ident;
2617 old_ident = silc_command_get_ident(cmd->payload);
2618 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
2619 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
2621 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
2622 SILC_PACKET_COMMAND, cmd->packet->flags,
2623 tmpbuf->data, tmpbuf->len, TRUE);
2625 /* Reprocess this packet after received reply from router */
2626 silc_server_command_pending(server, SILC_COMMAND_MOTD,
2627 silc_command_get_ident(cmd->payload),
2628 silc_server_command_motd,
2629 silc_server_command_dup(cmd));
2630 cmd->pending = TRUE;
2631 silc_command_set_ident(cmd->payload, old_ident);
2632 silc_buffer_free(tmpbuf);
2637 silc_server_command_send_status_data(cmd, SILC_COMMAND_MOTD,
2638 SILC_STATUS_ERR_NO_SUCH_SERVER, 0,
2640 strlen(dest_server));
2644 idp = silc_id_payload_encode(server->id_entry->id, SILC_ID_SERVER);
2645 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_MOTD,
2646 SILC_STATUS_OK, 0, ident, 2,
2650 strlen(entry->motd) : 0);
2651 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
2652 packet->data, packet->len, FALSE);
2653 silc_buffer_free(packet);
2654 silc_buffer_free(idp);
2658 silc_server_command_free(cmd);
2661 /* Server side of command UMODE. Client can use this command to set/unset
2662 user mode. Client actually cannot set itself to be as server/router
2663 operator so this can be used only to unset the modes. */
2665 SILC_SERVER_CMD_FUNC(umode)
2667 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
2668 SilcServer server = cmd->server;
2669 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
2671 unsigned char *tmp_mask, m[4];
2672 SilcUInt32 mask = 0;
2673 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
2674 bool set_mask = FALSE;
2676 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
2679 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_UMODE, cmd, 1, 2);
2681 /* Get the client's mode mask */
2682 tmp_mask = silc_argument_get_arg_type(cmd->args, 2, NULL);
2684 SILC_GET32_MSB(mask, tmp_mask);
2689 /* Check that mode changing is allowed. */
2690 if (!silc_server_check_umode_rights(server, client, mask)) {
2691 silc_server_command_send_status_reply(cmd, SILC_COMMAND_UMODE,
2692 SILC_STATUS_ERR_PERM_DENIED, 0);
2696 /* Anonymous mode cannot be set by client */
2697 if (mask & SILC_UMODE_ANONYMOUS &&
2698 !(client->mode & SILC_UMODE_ANONYMOUS)) {
2699 silc_server_command_send_status_reply(cmd, SILC_COMMAND_UMODE,
2700 SILC_STATUS_ERR_PERM_DENIED, 0);
2704 /* Update statistics */
2705 if (mask & SILC_UMODE_GONE) {
2706 if (!(client->mode & SILC_UMODE_GONE))
2707 server->stat.my_aways++;
2709 if (client->mode & SILC_UMODE_GONE)
2710 server->stat.my_aways--;
2713 /* If the client has anonymous mode set, preserve it. */
2714 if (client->mode & SILC_UMODE_ANONYMOUS)
2715 mask |= SILC_UMODE_ANONYMOUS;
2717 /* Change the mode */
2718 client->mode = mask;
2720 /* Send UMODE change to primary router */
2721 silc_server_send_notify_umode(server, SILC_PRIMARY_ROUTE(server),
2722 SILC_BROADCAST(server), client->id,
2725 /* Check if anyone is watching this nickname */
2726 if (server->server_type == SILC_ROUTER)
2727 silc_server_check_watcher_list(server, client, NULL,
2728 SILC_NOTIFY_TYPE_UMODE_CHANGE);
2731 /* Send command reply to sender */
2732 SILC_PUT32_MSB(client->mode, m);
2733 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_UMODE,
2734 SILC_STATUS_OK, 0, ident, 1,
2736 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
2737 packet->data, packet->len, FALSE);
2738 silc_buffer_free(packet);
2741 silc_server_command_free(cmd);
2744 /* Server side command of CMODE. Changes channel mode */
2746 SILC_SERVER_CMD_FUNC(cmode)
2748 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
2749 SilcServer server = cmd->server;
2750 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
2751 SilcIDListData idata = (SilcIDListData)client;
2752 SilcChannelID *channel_id = NULL;
2753 SilcChannelEntry channel;
2754 SilcChannelClientEntry chl;
2755 SilcBuffer packet, cidp;
2756 unsigned char *tmp, *tmp_id, *tmp_mask, *chpkdata = NULL;
2757 char *cipher = NULL, *hmac = NULL, *passphrase = NULL;
2758 SilcUInt32 mode_mask = 0, old_mask = 0, tmp_len, tmp_len2, chpklen;
2759 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
2760 bool set_mask = FALSE, set_chpk = FALSE;
2761 SilcPublicKey founder_key = NULL;
2762 SilcBuffer fkey = NULL, chpklist = NULL;
2763 SilcBufferStruct chpk;
2766 silc_server_command_free(cmd);
2770 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_CMODE, cmd, 1, 9);
2772 /* Get Channel ID */
2773 tmp_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_len2);
2775 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2776 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
2777 silc_server_command_free(cmd);
2780 channel_id = silc_id_payload_parse_id(tmp_id, tmp_len2, NULL);
2782 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2783 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
2784 silc_server_command_free(cmd);
2788 /* Get channel entry */
2789 channel = silc_idlist_find_channel_by_id(server->local_list,
2792 channel = silc_idlist_find_channel_by_id(server->global_list,
2795 silc_server_command_send_status_data(cmd, SILC_COMMAND_CMODE,
2796 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
2797 0, 2, tmp_id, tmp_len2);
2798 silc_free(channel_id);
2799 silc_server_command_free(cmd);
2803 old_mask = channel->mode;
2805 /* Get the channel mode mask */
2806 tmp_mask = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
2808 SILC_GET32_MSB(mode_mask, tmp_mask);
2812 /* Check whether this client is on the channel */
2813 if (!silc_server_client_on_channel(client, channel, &chl)) {
2814 silc_server_command_send_status_data(cmd, SILC_COMMAND_CMODE,
2815 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0,
2816 2, tmp_id, tmp_len2);
2820 /* Check that client has rights to change any requested channel modes */
2821 if (set_mask && !silc_server_check_cmode_rights(server, channel, chl,
2823 SILC_LOG_DEBUG(("Client does not have rights to change mode"));
2824 silc_server_command_send_status_data(
2825 cmd, SILC_COMMAND_CMODE,
2826 (!(chl->mode & SILC_CHANNEL_UMODE_CHANOP) ?
2827 SILC_STATUS_ERR_NO_CHANNEL_PRIV :
2828 SILC_STATUS_ERR_NO_CHANNEL_FOPRIV), 0,
2829 2, tmp_id, tmp_len2);
2833 /* If mode mask was not sent as argument then merely return the current
2834 mode mask, founder key and channel public key list to the sender. */
2837 SILC_PUT32_MSB(channel->mode, m);
2838 if (channel->founder_key)
2839 fkey = silc_pkcs_public_key_payload_encode(channel->founder_key);
2840 if (channel->channel_pubkeys)
2841 chpklist = silc_server_get_channel_pk_list(server, channel,
2844 silc_command_reply_payload_encode_va(SILC_COMMAND_CMODE,
2845 SILC_STATUS_OK, 0, ident, 4,
2846 2, tmp_id, tmp_len2,
2848 4, fkey ? fkey->data : NULL,
2849 fkey ? fkey->len : 0,
2850 5, chpklist ? chpklist->data : NULL,
2851 chpklist ? chpklist->len : 0);
2852 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
2853 packet->data, packet->len, FALSE);
2854 silc_buffer_free(packet);
2859 * Check the modes. Modes that requires nothing special operation are
2863 if (mode_mask & SILC_CHANNEL_MODE_PRIVKEY) {
2864 /* Channel uses private keys to protect traffic. Client(s) has set the
2865 key locally they want to use, server does not know that key. */
2866 /* Nothing interesting to do here */
2868 if (channel->mode & SILC_CHANNEL_MODE_PRIVKEY) {
2869 /* The mode is removed and we need to generate and distribute
2870 new channel key. Clients are not using private channel keys
2871 anymore after this. */
2873 /* Re-generate channel key */
2874 if (!silc_server_create_channel_key(server, channel, 0))
2877 /* Send the channel key. This sends it to our local clients and if
2878 we are normal server to our router as well. */
2879 silc_server_send_channel_key(server, NULL, channel,
2880 server->server_type == SILC_ROUTER ?
2881 FALSE : !server->standalone);
2883 cipher = (char *)silc_cipher_get_name(channel->channel_key);
2884 hmac = (char *)silc_hmac_get_name(channel->hmac);
2888 if (mode_mask & SILC_CHANNEL_MODE_ULIMIT) {
2889 /* User limit is set on channel */
2890 SilcUInt32 user_limit;
2892 /* Get user limit */
2893 tmp = silc_argument_get_arg_type(cmd->args, 3, NULL);
2895 if (!(channel->mode & SILC_CHANNEL_MODE_ULIMIT)) {
2896 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2897 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
2901 SILC_GET32_MSB(user_limit, tmp);
2902 channel->user_limit = user_limit;
2905 if (channel->mode & SILC_CHANNEL_MODE_ULIMIT)
2906 /* User limit mode is unset. Remove user limit */
2907 channel->user_limit = 0;
2910 if (mode_mask & SILC_CHANNEL_MODE_PASSPHRASE) {
2911 if (!(channel->mode & SILC_CHANNEL_MODE_PASSPHRASE)) {
2912 /* Passphrase has been set to channel */
2914 /* Get the passphrase */
2915 tmp = silc_argument_get_arg_type(cmd->args, 4, NULL);
2917 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2918 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
2922 /* Save the passphrase */
2923 passphrase = channel->passphrase = silc_memdup(tmp, strlen(tmp));
2926 if (channel->mode & SILC_CHANNEL_MODE_PASSPHRASE) {
2927 /* Passphrase mode is unset. remove the passphrase */
2928 silc_free(channel->passphrase);
2929 channel->passphrase = NULL;
2933 if (mode_mask & SILC_CHANNEL_MODE_CIPHER) {
2934 if (!(channel->mode & SILC_CHANNEL_MODE_CIPHER)) {
2935 /* Cipher to use protect the traffic */
2936 SilcCipher newkey, oldkey;
2939 cipher = silc_argument_get_arg_type(cmd->args, 5, NULL);
2941 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2942 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
2946 /* Delete old cipher and allocate the new one */
2947 if (!silc_cipher_alloc(cipher, &newkey)) {
2948 silc_server_command_send_status_data(
2949 cmd, SILC_COMMAND_CMODE,
2950 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
2951 2, cipher, strlen(cipher));
2955 oldkey = channel->channel_key;
2956 channel->channel_key = newkey;
2958 /* Re-generate channel key */
2959 if (!silc_server_create_channel_key(server, channel, 0)) {
2960 /* We don't have new key, revert to old one */
2961 channel->channel_key = oldkey;
2965 /* Remove old channel key for good */
2966 silc_cipher_free(oldkey);
2968 /* Send the channel key. This sends it to our local clients and if
2969 we are normal server to our router as well. */
2970 silc_server_send_channel_key(server, NULL, channel,
2971 server->server_type == SILC_ROUTER ?
2972 FALSE : !server->standalone);
2975 if (channel->mode & SILC_CHANNEL_MODE_CIPHER) {
2976 /* Cipher mode is unset. Remove the cipher and revert back to
2978 SilcCipher newkey, oldkey;
2979 cipher = channel->cipher;
2981 /* Delete old cipher and allocate default one */
2982 if (!silc_cipher_alloc(cipher ? cipher : SILC_DEFAULT_CIPHER, &newkey)) {
2983 silc_server_command_send_status_data(
2984 cmd, SILC_COMMAND_CMODE,
2985 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
2986 2, cipher, strlen(cipher));
2990 oldkey = channel->channel_key;
2991 channel->channel_key = newkey;
2993 /* Re-generate channel key */
2994 if (!silc_server_create_channel_key(server, channel, 0)) {
2995 /* We don't have new key, revert to old one */
2996 channel->channel_key = oldkey;
3000 /* Remove old channel key for good */
3001 silc_cipher_free(oldkey);
3003 /* Send the channel key. This sends it to our local clients and if
3004 we are normal server to our router as well. */
3005 silc_server_send_channel_key(server, NULL, channel,
3006 server->server_type == SILC_ROUTER ?
3007 FALSE : !server->standalone);
3011 if (mode_mask & SILC_CHANNEL_MODE_HMAC) {
3012 if (!(channel->mode & SILC_CHANNEL_MODE_HMAC)) {
3013 /* HMAC to use protect the traffic */
3014 unsigned char hash[32];
3018 hmac = silc_argument_get_arg_type(cmd->args, 6, NULL);
3020 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3021 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
3025 /* Delete old hmac and allocate the new one */
3026 if (!silc_hmac_alloc(hmac, NULL, &newhmac)) {
3027 silc_server_command_send_status_data(
3028 cmd, SILC_COMMAND_CMODE,
3029 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
3030 2, hmac, strlen(hmac));
3034 silc_hmac_free(channel->hmac);
3035 channel->hmac = newhmac;
3037 /* Set the HMAC key out of current channel key. The client must do
3039 silc_hash_make(silc_hmac_get_hash(channel->hmac), channel->key,
3040 channel->key_len / 8, hash);
3041 silc_hmac_set_key(channel->hmac, hash,
3042 silc_hash_len(silc_hmac_get_hash(channel->hmac)));
3043 memset(hash, 0, sizeof(hash));
3046 if (channel->mode & SILC_CHANNEL_MODE_HMAC) {
3047 /* Hmac mode is unset. Remove the hmac and revert back to
3050 unsigned char hash[32];
3051 hmac = channel->hmac_name;
3053 /* Delete old hmac and allocate default one */
3054 if (!silc_hmac_alloc(hmac ? hmac : SILC_DEFAULT_HMAC, NULL, &newhmac)) {
3055 silc_server_command_send_status_data(
3056 cmd, SILC_COMMAND_CMODE,
3057 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
3058 2, hmac, strlen(hmac));
3062 silc_hmac_free(channel->hmac);
3063 channel->hmac = newhmac;
3065 /* Set the HMAC key out of current channel key. The client must do
3067 silc_hash_make(silc_hmac_get_hash(channel->hmac), channel->key,
3068 channel->key_len / 8,
3070 silc_hmac_set_key(channel->hmac, hash,
3071 silc_hash_len(silc_hmac_get_hash(channel->hmac)));
3072 memset(hash, 0, sizeof(hash));
3076 if (mode_mask & SILC_CHANNEL_MODE_FOUNDER_AUTH) {
3077 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3078 /* Check if the founder public key was received */
3079 founder_key = idata->public_key;
3080 tmp = silc_argument_get_arg_type(cmd->args, 8, &tmp_len);
3082 if (!silc_pkcs_public_key_payload_decode(tmp, tmp_len, &founder_key)) {
3083 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3084 SILC_STATUS_ERR_AUTH_FAILED,
3089 /* If key was not sent and the channel mode has already founder
3090 then the key was not to be changed. */
3091 if (channel->mode & SILC_CHANNEL_MODE_FOUNDER_AUTH)
3095 /* Set the founder authentication */
3096 tmp = silc_argument_get_arg_type(cmd->args, 7, &tmp_len);
3098 silc_server_command_send_status_reply(
3099 cmd, SILC_COMMAND_CMODE,
3100 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
3104 /* Verify the payload before setting the mode */
3105 if (!silc_auth_verify_data(tmp, tmp_len, SILC_AUTH_PUBLIC_KEY,
3106 founder_key, 0, server->sha1hash,
3107 client->id, SILC_ID_CLIENT)) {
3108 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3109 SILC_STATUS_ERR_AUTH_FAILED,
3114 /* Save the public key */
3115 if (channel->founder_key)
3116 silc_pkcs_public_key_free(channel->founder_key);
3117 if (silc_argument_get_arg_type(cmd->args, 8, NULL))
3118 channel->founder_key = founder_key;
3120 channel->founder_key = silc_pkcs_public_key_copy(founder_key);
3121 if (!channel->founder_key) {
3122 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3123 SILC_STATUS_ERR_AUTH_FAILED,
3128 fkey = silc_pkcs_public_key_payload_encode(channel->founder_key);
3130 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3131 SILC_STATUS_ERR_AUTH_FAILED,
3133 silc_pkcs_public_key_free(channel->founder_key);
3134 channel->founder_key = NULL;
3139 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3140 if (channel->mode & SILC_CHANNEL_MODE_FOUNDER_AUTH) {
3141 if (channel->founder_key)
3142 silc_pkcs_public_key_free(channel->founder_key);
3143 channel->founder_key = NULL;
3149 if (mode_mask & SILC_CHANNEL_MODE_CHANNEL_AUTH) {
3150 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3153 chpkdata = silc_argument_get_arg_type(cmd->args, 9, &chpklen);
3155 if (!chpkdata && channel->mode & SILC_CHANNEL_MODE_CHANNEL_AUTH)
3160 /* Process the channel public key(s) */
3161 st = silc_server_set_channel_pk_list(server, NULL, channel,
3163 if (st != SILC_STATUS_OK) {
3164 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE, st, 0);
3169 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3170 if (channel->mode & SILC_CHANNEL_MODE_CHANNEL_AUTH) {
3171 if (channel->channel_pubkeys)
3172 silc_hash_table_free(channel->channel_pubkeys);
3173 channel->channel_pubkeys = NULL;
3180 /* Finally, set the mode */
3181 old_mask = channel->mode = mode_mask;
3183 /* Send CMODE_CHANGE notify. */
3184 cidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
3185 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, TRUE,
3186 SILC_NOTIFY_TYPE_CMODE_CHANGE, 7,
3187 cidp->data, cidp->len,
3189 cipher, cipher ? strlen(cipher) : 0,
3190 hmac, hmac ? strlen(hmac) : 0,
3191 passphrase, passphrase ?
3192 strlen(passphrase) : 0,
3193 fkey ? fkey->data : NULL,
3194 fkey ? fkey->len : 0,
3195 chpkdata ? chpkdata : NULL,
3196 chpkdata ? chpklen : 0);
3198 /* Set CMODE notify type to network */
3199 if (chpkdata && chpklen)
3200 silc_buffer_set(&chpk, chpkdata, chpklen);
3201 silc_server_send_notify_cmode(server, SILC_PRIMARY_ROUTE(server),
3202 SILC_BROADCAST(server), channel,
3203 mode_mask, client->id, SILC_ID_CLIENT,
3204 cipher, hmac, passphrase, founder_key,
3205 chpkdata ? &chpk : NULL);
3208 chpklist = silc_server_get_channel_pk_list(server, channel, FALSE, FALSE);
3210 /* Send command reply to sender */
3211 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_CMODE,
3212 SILC_STATUS_OK, 0, ident, 4,
3213 2, tmp_id, tmp_len2,
3215 4, fkey ? fkey->data : NULL,
3216 fkey ? fkey->len : 0,
3217 5, chpklist ? chpklist->data :
3218 NULL, chpklist ? chpklist->len
3220 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
3221 packet->data, packet->len, FALSE);
3223 silc_buffer_free(packet);
3224 silc_buffer_free(cidp);
3227 channel->mode = old_mask;
3228 silc_buffer_free(chpklist);
3229 silc_buffer_free(fkey);
3230 silc_free(channel_id);
3231 silc_server_command_free(cmd);
3234 /* Server side of CUMODE command. Changes client's mode on a channel. */
3236 SILC_SERVER_CMD_FUNC(cumode)
3238 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
3239 SilcServer server = cmd->server;
3240 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
3241 SilcChannelID *channel_id = NULL;
3242 SilcClientID *client_id = NULL;
3243 SilcChannelEntry channel;
3244 SilcClientEntry target_client;
3245 SilcChannelClientEntry chl;
3246 SilcBuffer packet, idp;
3247 unsigned char *tmp_id, *tmp_ch_id, *tmp_mask;
3248 SilcUInt32 target_mask, sender_mask = 0, tmp_len, tmp_ch_len;
3250 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
3251 SilcPublicKey founder_key = NULL;
3252 SilcBuffer fkey = NULL;
3257 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_CUMODE, cmd, 3, 4);
3259 /* Get Channel ID */
3260 tmp_ch_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_ch_len);
3262 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3263 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
3266 channel_id = silc_id_payload_parse_id(tmp_ch_id, tmp_ch_len, NULL);
3268 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3269 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
3273 /* Get channel entry */
3274 channel = silc_idlist_find_channel_by_id(server->local_list,
3277 channel = silc_idlist_find_channel_by_id(server->global_list,
3280 silc_server_command_send_status_data(cmd, SILC_COMMAND_CUMODE,
3281 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
3282 0, 2, tmp_ch_id, tmp_ch_len);
3287 /* Check whether sender is on the channel */
3288 if (!silc_server_client_on_channel(client, channel, &chl)) {
3289 silc_server_command_send_status_data(cmd, SILC_COMMAND_CUMODE,
3290 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0,
3291 2, tmp_ch_id, tmp_ch_len);
3294 sender_mask = chl->mode;
3296 /* Get the target client's channel mode mask */
3297 tmp_mask = silc_argument_get_arg_type(cmd->args, 2, NULL);
3299 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3300 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
3304 SILC_GET32_MSB(target_mask, tmp_mask);
3306 /* Get target Client ID */
3307 tmp_id = silc_argument_get_arg_type(cmd->args, 3, &tmp_len);
3309 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3310 SILC_STATUS_ERR_NO_CLIENT_ID, 0);
3313 client_id = silc_id_payload_parse_id(tmp_id, tmp_len, NULL);
3315 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3316 SILC_STATUS_ERR_NO_CLIENT_ID, 0);
3320 /* Get target client's entry */
3321 target_client = silc_idlist_find_client_by_id(server->local_list,
3322 client_id, TRUE, NULL);
3323 if (!target_client) {
3324 target_client = silc_idlist_find_client_by_id(server->global_list,
3325 client_id, TRUE, NULL);
3328 if (target_client != client &&
3329 !(sender_mask & SILC_CHANNEL_UMODE_CHANFO) &&
3330 !(sender_mask & SILC_CHANNEL_UMODE_CHANOP)) {
3331 silc_server_command_send_status_data(cmd, SILC_COMMAND_CUMODE,
3332 SILC_STATUS_ERR_NO_CHANNEL_PRIV, 0,
3333 2, tmp_ch_id, tmp_ch_len);
3337 /* Check whether target client is on the channel */
3338 if (target_client != client) {
3339 if (!silc_server_client_on_channel(target_client, channel, &chl)) {
3340 silc_server_command_send_status_data2(
3341 cmd, SILC_COMMAND_CUMODE,
3342 SILC_STATUS_ERR_USER_NOT_ON_CHANNEL, 0,
3344 3, tmp_ch_id, tmp_ch_len);
3353 /* If the target client is founder, no one else can change their mode
3355 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO && client != target_client) {
3356 silc_server_command_send_status_data(cmd, SILC_COMMAND_CUMODE,
3357 SILC_STATUS_ERR_NO_CHANNEL_FOPRIV,
3358 0, 2, tmp_ch_id, tmp_ch_len);
3362 if (target_mask & SILC_CHANNEL_UMODE_CHANFO) {
3363 if (target_client != client) {
3364 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3365 SILC_STATUS_ERR_NOT_YOU, 0);
3369 if (!(chl->mode & SILC_CHANNEL_UMODE_CHANFO)) {
3370 /* The client tries to claim the founder rights. */
3371 unsigned char *tmp_auth;
3372 SilcUInt32 tmp_auth_len;
3373 SilcChannelClientEntry chl2;
3374 SilcHashTableList htl;
3376 if (!(channel->mode & SILC_CHANNEL_MODE_FOUNDER_AUTH) ||
3377 !channel->founder_key) {
3378 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3379 SILC_STATUS_ERR_AUTH_FAILED, 0);
3383 tmp_auth = silc_argument_get_arg_type(cmd->args, 4, &tmp_auth_len);
3385 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3386 SILC_STATUS_ERR_AUTH_FAILED, 0);
3390 /* Verify the authentication payload */
3391 if (!silc_auth_verify_data(tmp_auth, tmp_auth_len, SILC_AUTH_PUBLIC_KEY,
3392 channel->founder_key, 0, server->sha1hash,
3393 client->id, SILC_ID_CLIENT)) {
3394 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3395 SILC_STATUS_ERR_AUTH_FAILED, 0);
3400 founder_key = channel->founder_key;
3401 fkey = silc_pkcs_public_key_payload_encode(founder_key);
3403 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3404 SILC_STATUS_ERR_AUTH_FAILED, 0);
3408 /* There cannot be anyone else as founder on the channel now. This
3409 client is definitely the founder due to this authentication */
3410 silc_hash_table_list(channel->user_list, &htl);
3411 while (silc_hash_table_get(&htl, NULL, (void *)&chl2))
3412 if (chl2->mode & SILC_CHANNEL_UMODE_CHANFO) {
3413 chl2->mode &= ~SILC_CHANNEL_UMODE_CHANFO;
3414 silc_server_force_cumode_change(server, NULL, channel, chl2,
3418 silc_hash_table_list_reset(&htl);
3420 sender_mask = chl->mode |= SILC_CHANNEL_UMODE_CHANFO;
3423 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3424 if (target_client == client) {
3425 /* Remove channel founder rights from itself */
3426 chl->mode &= ~SILC_CHANNEL_UMODE_CHANFO;
3429 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3430 SILC_STATUS_ERR_NOT_YOU, 0);
3436 if (target_mask & SILC_CHANNEL_UMODE_CHANOP) {
3437 /* Promote to operator */
3438 if (!(chl->mode & SILC_CHANNEL_UMODE_CHANOP)) {
3439 if (!(sender_mask & SILC_CHANNEL_UMODE_CHANOP) &&
3440 !(sender_mask & SILC_CHANNEL_UMODE_CHANFO)) {
3441 silc_server_command_send_status_data(cmd, SILC_COMMAND_CUMODE,
3442 SILC_STATUS_ERR_NO_CHANNEL_PRIV,
3443 0, 2, tmp_ch_id, tmp_ch_len);
3447 chl->mode |= SILC_CHANNEL_UMODE_CHANOP;
3451 if (chl->mode & SILC_CHANNEL_UMODE_CHANOP) {
3452 if (!(sender_mask & SILC_CHANNEL_UMODE_CHANOP) &&
3453 !(sender_mask & SILC_CHANNEL_UMODE_CHANFO)) {
3454 silc_server_command_send_status_data(cmd, SILC_COMMAND_CUMODE,
3455 SILC_STATUS_ERR_NO_CHANNEL_PRIV,
3456 0, 2, tmp_ch_id, tmp_ch_len);
3460 /* Demote to normal user */
3461 chl->mode &= ~SILC_CHANNEL_UMODE_CHANOP;
3466 if (target_mask & SILC_CHANNEL_UMODE_BLOCK_MESSAGES) {
3467 if (target_client != client) {
3468 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3469 SILC_STATUS_ERR_NOT_YOU, 0);
3473 if (!(chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES)) {
3474 chl->mode |= SILC_CHANNEL_UMODE_BLOCK_MESSAGES;
3478 if (chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES) {
3479 if (target_client != client) {
3480 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3481 SILC_STATUS_ERR_NOT_YOU, 0);
3485 chl->mode &= ~SILC_CHANNEL_UMODE_BLOCK_MESSAGES;
3490 if (target_mask & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS) {
3491 if (target_client != client) {
3492 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3493 SILC_STATUS_ERR_NOT_YOU, 0);
3497 if (!(chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS)) {
3498 chl->mode |= SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS;
3502 if (chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS) {
3503 if (target_client != client) {
3504 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3505 SILC_STATUS_ERR_NOT_YOU, 0);
3509 chl->mode &= ~SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS;
3514 if (target_mask & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS) {
3515 if (target_client != client) {
3516 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3517 SILC_STATUS_ERR_NOT_YOU, 0);
3521 if (!(chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS)) {
3522 chl->mode |= SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS;
3526 if (chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS) {
3527 if (target_client != client) {
3528 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3529 SILC_STATUS_ERR_NOT_YOU, 0);
3533 chl->mode &= ~SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS;
3538 if (target_mask & SILC_CHANNEL_UMODE_QUIET) {
3539 if (!(chl->mode & SILC_CHANNEL_UMODE_QUIET)) {
3540 if (client == target_client) {
3541 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3542 SILC_STATUS_ERR_PERM_DENIED, 0);
3545 chl->mode |= SILC_CHANNEL_UMODE_QUIET;
3549 if (chl->mode & SILC_CHANNEL_UMODE_QUIET) {
3550 if (client == target_client) {
3551 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3552 SILC_STATUS_ERR_PERM_DENIED, 0);
3555 chl->mode &= ~SILC_CHANNEL_UMODE_QUIET;
3560 idp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
3561 tmp_id = silc_argument_get_arg_type(cmd->args, 3, &tmp_len);
3563 /* Send notify to channel, notify only if mode was actually changed. */
3565 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, TRUE,
3566 SILC_NOTIFY_TYPE_CUMODE_CHANGE, 4,
3567 idp->data, idp->len,
3570 fkey ? fkey->data : NULL,
3571 fkey ? fkey->len : 0);
3573 /* Set CUMODE notify type to network */
3574 silc_server_send_notify_cumode(server, SILC_PRIMARY_ROUTE(server),
3575 SILC_BROADCAST(server), channel,
3576 target_mask, client->id, SILC_ID_CLIENT,
3577 target_client->id, founder_key);
3580 /* Send command reply to sender */
3581 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_CUMODE,
3582 SILC_STATUS_OK, 0, ident, 3,
3584 3, tmp_ch_id, tmp_ch_len,
3585 4, tmp_id, tmp_len);
3586 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
3587 packet->data, packet->len, FALSE);
3589 silc_buffer_free(packet);
3590 silc_buffer_free(idp);
3593 silc_free(channel_id);
3594 silc_free(client_id);
3595 silc_buffer_free(fkey);
3596 silc_server_command_free(cmd);
3599 /* Server side of KICK command. Kicks client out of channel. */
3601 SILC_SERVER_CMD_FUNC(kick)
3603 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
3604 SilcServer server = cmd->server;
3605 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
3606 SilcClientEntry target_client;
3607 SilcChannelID *channel_id;
3608 SilcClientID *client_id;
3609 SilcChannelEntry channel;
3610 SilcChannelClientEntry chl;
3611 SilcBuffer idp, packet;
3612 SilcUInt32 tmp_len, target_idp_len, clen;
3613 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
3614 unsigned char *tmp, *comment, *target_idp;
3619 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_LEAVE, cmd, 1, 3);
3621 /* Get Channel ID */
3622 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
3624 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KICK,
3625 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
3628 channel_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
3630 silc_server_command_send_status_data(cmd, SILC_COMMAND_KICK,
3631 SILC_STATUS_ERR_BAD_CHANNEL_ID, 0,
3636 /* Get channel entry */
3637 channel = silc_idlist_find_channel_by_id(server->local_list,
3640 channel = silc_idlist_find_channel_by_id(server->local_list,
3643 silc_server_command_send_status_data(cmd, SILC_COMMAND_KICK,
3644 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
3645 0, 2, tmp, tmp_len);
3650 /* Check whether sender is on the channel */
3651 if (!silc_server_client_on_channel(client, channel, &chl)) {
3652 silc_server_command_send_status_data(cmd, SILC_COMMAND_KICK,
3653 SILC_STATUS_ERR_NOT_ON_CHANNEL,
3654 0, 2, tmp, tmp_len);
3658 /* Check that the kicker is channel operator or channel founder */
3659 if (!(chl->mode & SILC_CHANNEL_UMODE_CHANOP) &&
3660 !(chl->mode & SILC_CHANNEL_UMODE_CHANFO)) {
3661 silc_server_command_send_status_data(cmd, SILC_COMMAND_KICK,
3662 SILC_STATUS_ERR_NO_CHANNEL_PRIV,
3663 0, 2, tmp, tmp_len);
3667 /* Get target Client ID */
3668 target_idp = silc_argument_get_arg_type(cmd->args, 2, &target_idp_len);
3670 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KICK,
3671 SILC_STATUS_ERR_NO_CLIENT_ID, 0);
3674 client_id = silc_id_payload_parse_id(target_idp, target_idp_len, NULL);
3676 silc_server_command_send_status_data(cmd, SILC_COMMAND_KICK,
3677 SILC_STATUS_ERR_BAD_CLIENT_ID,
3678 0, 2, target_idp, target_idp_len);
3682 /* Get target client's entry */
3683 target_client = silc_idlist_find_client_by_id(server->local_list,
3684 client_id, TRUE, NULL);
3685 if (!target_client) {
3686 target_client = silc_idlist_find_client_by_id(server->global_list,
3687 client_id, TRUE, NULL);
3690 /* Check whether target client is on the channel */
3691 if (!silc_server_client_on_channel(target_client, channel, &chl)) {
3692 silc_server_command_send_status_data2(cmd, SILC_COMMAND_KICK,
3693 SILC_STATUS_ERR_USER_NOT_ON_CHANNEL,
3694 0, 2, target_idp, target_idp_len,
3699 /* Check that the target client is not channel founder. Channel founder
3700 cannot be kicked from the channel. */
3701 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3702 silc_server_command_send_status_data(cmd, SILC_COMMAND_KICK,
3703 SILC_STATUS_ERR_NO_CHANNEL_FOPRIV,
3704 0, 2, tmp, tmp_len);
3709 comment = silc_argument_get_arg_type(cmd->args, 3, &clen);
3714 /* Send the reply back to the client */
3716 silc_command_reply_payload_encode_va(SILC_COMMAND_KICK,
3717 SILC_STATUS_OK, 0, ident, 2,
3719 3, target_idp, target_idp_len);
3720 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
3721 packet->data, packet->len, FALSE);
3722 silc_buffer_free(packet);
3724 /* Send KICKED notify to local clients on the channel */
3725 idp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
3726 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, TRUE,
3727 SILC_NOTIFY_TYPE_KICKED, 3,
3728 target_idp, target_idp_len,
3729 comment, comment ? strlen(comment) : 0,
3730 idp->data, idp->len);
3731 silc_buffer_free(idp);
3733 /* Send KICKED notify to primary route */
3734 silc_server_send_notify_kicked(server, SILC_PRIMARY_ROUTE(server),
3735 SILC_BROADCAST(server), channel,
3736 target_client->id, client->id, comment);
3738 /* Remove the client from channel's invite list */
3739 if (channel->invite_list && silc_hash_table_count(channel->invite_list)) {
3741 silc_argument_payload_encode_one(NULL, target_idp, target_idp_len, 3);
3742 SilcArgumentPayload args =
3743 silc_argument_payload_parse(ab->data, ab->len, 1);
3744 silc_server_inviteban_process(server, channel->invite_list, 1, args);
3745 silc_buffer_free(ab);
3746 silc_argument_payload_free(args);
3749 /* Remove the client from the channel. If the channel does not exist
3750 after removing the client then the client kicked itself off the channel
3751 and we don't have to send anything after that. */
3752 if (!silc_server_remove_from_one_channel(server, NULL, channel,
3753 target_client, FALSE))
3756 if (!(channel->mode & SILC_CHANNEL_MODE_PRIVKEY)) {
3757 /* Re-generate channel key */
3758 if (!silc_server_create_channel_key(server, channel, 0))
3761 /* Send the channel key to the channel. The key of course is not sent
3762 to the client who was kicked off the channel. */
3763 silc_server_send_channel_key(server, target_client->connection, channel,
3764 server->server_type == SILC_ROUTER ?
3765 FALSE : !server->standalone);
3769 silc_server_command_free(cmd);
3772 /* Server side of OPER command. Client uses this comand to obtain server
3773 operator privileges to this server/router. */
3775 SILC_SERVER_CMD_FUNC(oper)
3777 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
3778 SilcServer server = cmd->server;
3779 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
3780 unsigned char *username, *auth;
3782 SilcServerConfigAdmin *admin;
3783 SilcIDListData idata = (SilcIDListData)client;
3784 bool result = FALSE;
3785 SilcPublicKey cached_key;
3787 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
3790 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_OPER, cmd, 1, 2);
3792 /* Get the username */
3793 username = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
3795 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3796 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
3801 /* Get the admin configuration */
3802 admin = silc_server_config_find_admin(server, cmd->sock->ip,
3803 username, client->nickname);
3805 admin = silc_server_config_find_admin(server, cmd->sock->hostname,
3806 username, client->nickname);
3808 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3809 SILC_STATUS_ERR_AUTH_FAILED,
3811 SILC_LOG_INFO(("OPER authentication failed for username '%s' by "
3812 "nickname '%s' from %s", username,
3813 client->nickname, cmd->sock->hostname));
3818 /* Get the authentication payload */
3819 auth = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
3821 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3822 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
3827 /* Verify the authentication data. If both passphrase and public key
3828 is set then try both of them. */
3829 if (admin->passphrase)
3830 result = silc_auth_verify_data(auth, tmp_len, SILC_AUTH_PASSWORD,
3831 admin->passphrase, admin->passphrase_len,
3832 idata->hash, client->id, SILC_ID_CLIENT);
3833 if (!result && admin->publickeys) {
3834 cached_key = silc_server_get_public_key(server, admin->publickeys);
3837 result = silc_auth_verify_data(auth, tmp_len, SILC_AUTH_PUBLIC_KEY,
3838 cached_key, 0, idata->hash,
3839 client->id, SILC_ID_CLIENT);
3842 /* Authentication failed */
3843 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3844 SILC_STATUS_ERR_AUTH_FAILED,
3849 /* Client is now server operator */
3850 client->mode |= SILC_UMODE_SERVER_OPERATOR;
3852 /* Update statistics */
3853 if (SILC_IS_LOCAL(client))
3854 server->stat.my_server_ops++;
3855 if (server->server_type == SILC_ROUTER)
3856 server->stat.server_ops++;
3858 /* Send UMODE change to primary router */
3859 silc_server_send_notify_umode(server, SILC_PRIMARY_ROUTE(server),
3860 SILC_BROADCAST(server), client->id,
3863 /* Check if anyone is watching this nickname */
3864 if (server->server_type == SILC_ROUTER)
3865 silc_server_check_watcher_list(server, client, NULL,
3866 SILC_NOTIFY_TYPE_UMODE_CHANGE);
3868 /* Send reply to the sender */
3869 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3873 silc_server_command_free(cmd);
3876 SILC_TASK_CALLBACK(silc_server_command_detach_cb)
3878 SilcServer server = app_context;
3879 QuitInternal q = (QuitInternal)context;
3880 SilcClientID *client_id = (SilcClientID *)q->sock;
3881 SilcClientEntry client;
3882 SilcSocketConnection sock;
3884 client = silc_idlist_find_client_by_id(server->local_list, client_id,
3886 if (client && client->connection) {
3887 sock = client->connection;
3889 /* If there is pending outgoing data for the client then purge it
3890 to the network before closing connection. */
3891 silc_server_packet_queue_purge(server, sock);
3893 /* Close the connection on our side */
3894 client->router = NULL;
3895 client->connection = NULL;
3896 sock->user_data = NULL;
3897 silc_server_close_connection(server, sock);
3900 silc_free(client_id);
3904 SILC_TASK_CALLBACK(silc_server_command_detach_timeout)
3906 SilcServer server = app_context;
3907 QuitInternal q = (QuitInternal)context;
3908 SilcClientID *client_id = (SilcClientID *)q->sock;
3909 SilcClientEntry client;
3911 client = silc_idlist_find_client_by_id(server->local_list, client_id,
3913 if (client && client->mode & SILC_UMODE_DETACHED) {
3914 SILC_LOG_DEBUG(("Detach timeout"));
3915 silc_server_free_client_data(server, NULL, client, TRUE,
3919 silc_free(client_id);
3923 /* Server side of DETACH command. Detached the client from the network
3924 by closing the connection but preserving the session. */
3926 SILC_SERVER_CMD_FUNC(detach)
3928 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
3929 SilcServer server = cmd->server;
3930 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
3933 if (server->config->detach_disabled) {
3934 silc_server_command_send_status_reply(cmd, SILC_COMMAND_DETACH,
3935 SILC_STATUS_ERR_OPERATION_ALLOWED,
3940 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
3943 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_DETACH, cmd, 0, 0);
3945 /* Remove operator privileges, since the client may resume in some
3946 other server which to it does not have operator privileges. */
3947 SILC_OPER_STATS_UPDATE(client, server, SILC_UMODE_SERVER_OPERATOR);
3948 SILC_OPER_STATS_UPDATE(client, router, SILC_UMODE_ROUTER_OPERATOR);
3950 /* Send the user mode notify to notify that client is detached */
3951 client->mode |= SILC_UMODE_DETACHED;
3952 client->data.status &= ~SILC_IDLIST_STATUS_RESUMED;
3953 client->data.status &= ~SILC_IDLIST_STATUS_NOATTR;
3954 client->last_command = 0;
3955 client->fast_command = 0;
3956 silc_server_send_notify_umode(server, SILC_PRIMARY_ROUTE(server),
3957 SILC_BROADCAST(server), client->id,
3959 server->stat.my_detached++;
3961 /* Check if anyone is watching this nickname */
3962 if (server->server_type == SILC_ROUTER)
3963 silc_server_check_watcher_list(server, client, NULL,
3964 SILC_NOTIFY_TYPE_UMODE_CHANGE);
3966 q = silc_calloc(1, sizeof(*q));
3967 q->sock = silc_id_dup(client->id, SILC_ID_CLIENT);
3968 silc_schedule_task_add(server->schedule, 0, silc_server_command_detach_cb,
3969 q, 0, 200000, SILC_TASK_TIMEOUT, SILC_TASK_PRI_LOW);
3971 if (server->config->detach_timeout) {
3972 q = silc_calloc(1, sizeof(*q));
3973 q->sock = silc_id_dup(client->id, SILC_ID_CLIENT);
3974 silc_schedule_task_add(server->schedule, 0,
3975 silc_server_command_detach_timeout,
3976 q, server->config->detach_timeout * 60,
3977 0, SILC_TASK_TIMEOUT, SILC_TASK_PRI_LOW);
3980 /* Send reply to the sender */
3981 silc_server_command_send_status_reply(cmd, SILC_COMMAND_DETACH,
3985 silc_server_command_free(cmd);
3988 /* Server side of WATCH command. */
3990 SILC_SERVER_CMD_FUNC(watch)
3992 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
3993 SilcServer server = cmd->server;
3994 char *add_nick, *del_nick;
3995 SilcUInt32 add_nick_len, del_nick_len, tmp_len;
3997 unsigned char hash[16], *tmp;
3998 SilcClientEntry client;
3999 SilcClientID *client_id = NULL;
4001 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_WATCH, cmd, 1, 3);
4003 if (server->server_type != SILC_ROUTER && !server->standalone) {
4004 if (!cmd->pending) {
4005 /* Send the command to router */
4007 SilcUInt16 old_ident;
4009 SILC_LOG_DEBUG(("Forwarding WATCH to router"));
4011 old_ident = silc_command_get_ident(cmd->payload);
4012 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
4013 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
4015 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
4016 SILC_PACKET_COMMAND, cmd->packet->flags,
4017 tmpbuf->data, tmpbuf->len, TRUE);
4019 /* Reprocess this packet after received reply from router */
4020 silc_server_command_pending(server, SILC_COMMAND_WATCH,
4021 silc_command_get_ident(cmd->payload),
4022 silc_server_command_watch,
4023 silc_server_command_dup(cmd));
4024 cmd->pending = TRUE;
4025 silc_command_set_ident(cmd->payload, old_ident);
4026 silc_buffer_free(tmpbuf);
4027 } else if (context2) {
4028 /* Received reply from router, just send same data to the client. */
4029 SilcServerCommandReplyContext reply = context2;
4032 SILC_LOG_DEBUG(("Received reply to WATCH from router"));
4033 silc_command_get_status(reply->payload, &status, NULL);
4034 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH, status,
4041 /* We are router and keep the watch list for local cell */
4043 /* Get the client ID */
4044 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
4046 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4047 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4051 client_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
4053 silc_server_command_send_status_data(cmd, SILC_COMMAND_WATCH,
4054 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID,
4055 0, 2, tmp, tmp_len);
4059 /* Get the client entry which must be in local list */
4060 client = silc_idlist_find_client_by_id(server->local_list,
4061 client_id, TRUE, NULL);
4063 silc_server_command_send_status_data(cmd, SILC_COMMAND_WATCH,
4064 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID, 0,
4070 add_nick = silc_argument_get_arg_type(cmd->args, 2, &add_nick_len);
4071 del_nick = silc_argument_get_arg_type(cmd->args, 3, &del_nick_len);
4072 if (!add_nick && !del_nick) {
4073 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4074 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4079 if (add_nick && add_nick_len > 128)
4080 add_nick[128] = '\0';
4081 if (del_nick && del_nick_len > 128)
4082 del_nick[128] = '\0';
4084 memset(nick, 0, sizeof(nick));
4086 /* Add new nickname to be watched in our cell */
4088 if (silc_server_name_bad_chars(add_nick, strlen(add_nick)) == TRUE) {
4089 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4090 SILC_STATUS_ERR_BAD_NICKNAME, 0);
4094 /* Hash the nick, we have the hash saved, not nicks because we can
4095 do one to one mapping to the nick from Client ID hash this way. */
4096 silc_to_lower(add_nick, nick, sizeof(nick) - 1);
4097 silc_hash_make(server->md5hash, nick, strlen(nick), hash);
4099 /* Check whether this client is already watching this nickname */
4100 if (silc_hash_table_find_by_context(server->watcher_list, hash,
4102 /* Nickname is alredy being watched for this client */
4103 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4104 SILC_STATUS_ERR_NICKNAME_IN_USE,
4109 /* Get the nickname from the watcher list and use the same key in
4110 new entries as well. If key doesn't exist then create it. */
4111 if (!silc_hash_table_find(server->watcher_list, hash, (void *)&tmp, NULL))
4112 tmp = silc_memdup(hash, CLIENTID_HASH_LEN);
4114 /* Add the client to the watcher list with the specified nickname hash. */
4115 silc_hash_table_add(server->watcher_list, tmp, client);
4118 /* Delete nickname from watch list */
4120 if (silc_server_name_bad_chars(del_nick, strlen(del_nick)) == TRUE) {
4121 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4122 SILC_STATUS_ERR_BAD_NICKNAME, 0);
4126 /* Hash the nick, we have the hash saved, not nicks because we can
4127 do one to one mapping to the nick from Client ID hash this way. */
4128 silc_to_lower(del_nick, nick, sizeof(nick) - 1);
4129 silc_hash_make(server->md5hash, nick, strlen(nick), hash);
4131 /* Check that this client is watching for this nickname */
4132 if (!silc_hash_table_find_by_context(server->watcher_list, hash,
4133 client, (void *)&tmp)) {
4134 /* Nickname is alredy being watched for this client */
4135 silc_server_command_send_status_data(cmd, SILC_COMMAND_WATCH,
4136 SILC_STATUS_ERR_NO_SUCH_NICK, 0,
4137 2, nick, strlen(nick));
4141 /* Delete the nickname from the watcher list. */
4142 silc_hash_table_del_by_context(server->watcher_list, hash, client);
4144 /* Now check whether there still exists entries with this key, if not
4145 then free the key to not leak memory. */
4146 if (!silc_hash_table_find(server->watcher_list, hash, NULL, NULL))
4150 /* Distribute the watch list to backup routers too */
4151 if (server->backup) {
4153 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
4154 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
4155 silc_server_backup_send(server, NULL, SILC_PACKET_COMMAND,
4156 cmd->packet->flags, tmpbuf->data, tmpbuf->len,
4158 silc_buffer_free(tmpbuf);
4161 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4165 silc_free(client_id);
4166 silc_server_command_free(cmd);
4169 /* Server side of SILCOPER command. Client uses this comand to obtain router
4170 operator privileges to this router. */
4172 SILC_SERVER_CMD_FUNC(silcoper)
4174 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4175 SilcServer server = cmd->server;
4176 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
4177 unsigned char *username, *auth;
4179 SilcServerConfigAdmin *admin;
4180 SilcIDListData idata = (SilcIDListData)client;
4181 bool result = FALSE;
4182 SilcPublicKey cached_key;
4184 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
4187 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_SILCOPER, cmd, 1, 2);
4189 if (server->server_type != SILC_ROUTER) {
4190 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4191 SILC_STATUS_ERR_AUTH_FAILED, 0);
4195 /* Get the username */
4196 username = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
4198 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4199 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4204 /* Get the admin configuration */
4205 admin = silc_server_config_find_admin(server, cmd->sock->ip,
4206 username, client->nickname);
4208 admin = silc_server_config_find_admin(server, cmd->sock->hostname,
4209 username, client->nickname);
4211 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4212 SILC_STATUS_ERR_AUTH_FAILED, 0);
4213 SILC_LOG_INFO(("SILCOPER authentication failed for username '%s' by "
4214 "nickname '%s' from %s", username,
4215 client->nickname, cmd->sock->hostname));
4220 /* Get the authentication payload */
4221 auth = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
4223 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4224 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4229 /* Verify the authentication data. If both passphrase and public key
4230 is set then try both of them. */
4231 if (admin->passphrase)
4232 result = silc_auth_verify_data(auth, tmp_len, SILC_AUTH_PASSWORD,
4233 admin->passphrase, admin->passphrase_len,
4234 idata->hash, client->id, SILC_ID_CLIENT);
4235 if (!result && admin->publickeys) {
4236 cached_key = silc_server_get_public_key(server, admin->publickeys);
4239 result = silc_auth_verify_data(auth, tmp_len, SILC_AUTH_PUBLIC_KEY,
4240 cached_key, 0, idata->hash,
4241 client->id, SILC_ID_CLIENT);
4244 /* Authentication failed */
4245 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
4246 SILC_STATUS_ERR_AUTH_FAILED, 0);
4250 /* Client is now router operator */
4251 client->mode |= SILC_UMODE_ROUTER_OPERATOR;
4253 /* Update statistics */
4254 if (SILC_IS_LOCAL(client))
4255 server->stat.my_router_ops++;
4256 if (server->server_type == SILC_ROUTER)
4257 server->stat.router_ops++;
4259 /* Send UMODE change to primary router */
4260 silc_server_send_notify_umode(server, SILC_PRIMARY_ROUTE(server),
4261 SILC_BROADCAST(server), client->id,
4264 /* Check if anyone is watching this nickname */
4265 if (server->server_type == SILC_ROUTER)
4266 silc_server_check_watcher_list(server, client, NULL,
4267 SILC_NOTIFY_TYPE_UMODE_CHANGE);
4269 /* Send reply to the sender */
4270 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4274 silc_server_command_free(cmd);
4277 /* Server side of command BAN. This is used to manage the ban list of the
4278 channel. To add clients and remove clients from the ban list. */
4280 SILC_SERVER_CMD_FUNC(ban)
4282 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4283 SilcServer server = cmd->server;
4284 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
4285 SilcBuffer packet, list, tmp2;
4286 SilcChannelEntry channel;
4287 SilcChannelClientEntry chl;
4288 SilcChannelID *channel_id = NULL;
4289 unsigned char *id, *tmp, *atype = NULL;
4290 SilcUInt32 id_len, len, len2;
4291 SilcArgumentPayload args;
4292 SilcHashTableList htl;
4294 SilcUInt16 argc = 0, ident = silc_command_get_ident(cmd->payload);
4295 SilcBufferStruct blist;
4297 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
4300 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_BAN, cmd, 0, 3);
4302 /* Get Channel ID */
4303 id = silc_argument_get_arg_type(cmd->args, 1, &id_len);
4305 channel_id = silc_id_payload_parse_id(id, id_len, NULL);
4307 silc_server_command_send_status_reply(cmd, SILC_COMMAND_BAN,
4308 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
4313 /* Get channel entry. The server must know about the channel since the
4314 client is expected to be on the channel. */
4315 channel = silc_idlist_find_channel_by_id(server->local_list,
4318 channel = silc_idlist_find_channel_by_id(server->global_list,
4321 silc_server_command_send_status_data(cmd, SILC_COMMAND_BAN,
4322 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
4328 /* Check whether this client is on the channel */
4329 if (!silc_server_client_on_channel(client, channel, &chl)) {
4330 silc_server_command_send_status_data(cmd, SILC_COMMAND_BAN,
4331 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0,
4336 /* The client must be at least channel operator. */
4337 if (!(chl->mode & SILC_CHANNEL_UMODE_CHANOP)) {
4338 silc_server_command_send_status_data(cmd, SILC_COMMAND_BAN,
4339 SILC_STATUS_ERR_NO_CHANNEL_PRIV, 0,
4344 /* Get the ban information */
4345 tmp = silc_argument_get_arg_type(cmd->args, 3, &len2);
4346 if (tmp && len2 > 2) {
4347 /* Parse the arguments to see they are constructed correctly */
4348 SILC_GET16_MSB(argc, tmp);
4349 args = silc_argument_payload_parse(tmp + 2, len2 - 2, argc);
4351 silc_server_command_send_status_reply(cmd, SILC_COMMAND_BAN,
4352 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4357 /* Get the type of action */
4358 atype = silc_argument_get_arg_type(cmd->args, 2, &len);
4359 if (atype && len == 1) {
4360 if (atype[0] == 0x00) {
4361 /* Allocate hash table for ban list if it doesn't exist yet */
4362 if (!channel->ban_list)
4364 silc_hash_table_alloc(0, silc_hash_ptr,
4366 silc_server_inviteban_destruct, channel,
4369 /* Check for resource limit */
4370 if (silc_hash_table_count(channel->ban_list) > 64) {
4371 silc_server_command_send_status_reply(cmd, SILC_COMMAND_BAN,
4372 SILC_STATUS_ERR_RESOURCE_LIMIT,
4378 /* Now add or delete the information. */
4379 silc_server_inviteban_process(server, channel->ban_list,
4380 (SilcUInt8)atype[0], args);
4382 silc_argument_payload_free(args);
4385 /* Encode ban list */
4387 if (channel->ban_list && silc_hash_table_count(channel->ban_list)) {
4388 list = silc_buffer_alloc_size(2);
4389 silc_buffer_format(list,
4390 SILC_STR_UI_SHORT(silc_hash_table_count(
4391 channel->ban_list)),
4393 silc_hash_table_list(channel->ban_list, &htl);
4394 while (silc_hash_table_get(&htl, (void *)&type, (void *)&tmp2))
4395 list = silc_argument_payload_encode_one(list, tmp2->data, tmp2->len,
4397 silc_hash_table_list_reset(&htl);
4400 /* Send BAN notify type to local servers (but not clients) and to
4402 if (atype && tmp && len2) {
4403 silc_buffer_set(&blist, tmp, len2);
4405 /* Send to local servers if we are router */
4406 if (server->server_type == SILC_ROUTER)
4407 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, FALSE,
4408 SILC_NOTIFY_TYPE_BAN, 3,
4411 tmp ? blist.data : NULL,
4412 tmp ? blist.len : 0);
4414 /* Send to network. */
4415 silc_server_send_notify_ban(server, SILC_PRIMARY_ROUTE(server),
4416 SILC_BROADCAST(server), channel, atype,
4420 /* Send the reply back to the client */
4422 silc_command_reply_payload_encode_va(SILC_COMMAND_BAN,
4423 SILC_STATUS_OK, 0, ident, 2,
4425 3, list ? list->data : NULL,
4426 list ? list->len : 0);
4427 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
4428 packet->data, packet->len, FALSE);
4430 silc_buffer_free(packet);
4431 silc_buffer_free(list);
4434 silc_free(channel_id);
4435 silc_server_command_free(cmd);
4438 /* Server side command of LEAVE. Removes client from a channel. */
4440 SILC_SERVER_CMD_FUNC(leave)
4442 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4443 SilcServer server = cmd->server;
4444 SilcSocketConnection sock = cmd->sock;
4445 SilcClientEntry id_entry = (SilcClientEntry)cmd->sock->user_data;
4446 SilcChannelID *id = NULL;
4447 SilcChannelEntry channel;
4451 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !id_entry)
4454 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_LEAVE, cmd, 1, 2);
4456 /* Get Channel ID */
4457 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
4459 silc_server_command_send_status_reply(cmd, SILC_COMMAND_LEAVE,
4460 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
4463 id = silc_id_payload_parse_id(tmp, len, NULL);
4465 silc_server_command_send_status_reply(cmd, SILC_COMMAND_LEAVE,
4466 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
4470 /* Get channel entry */
4471 channel = silc_idlist_find_channel_by_id(server->local_list, id, NULL);
4473 channel = silc_idlist_find_channel_by_id(server->global_list, id, NULL);
4475 silc_server_command_send_status_data(cmd, SILC_COMMAND_LEAVE,
4476 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
4482 /* Check whether this client is on the channel */
4483 if (!silc_server_client_on_channel(id_entry, channel, NULL)) {
4484 silc_server_command_send_status_data(cmd, SILC_COMMAND_LEAVE,
4485 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0,
4490 /* Notify routers that they should remove this client from their list
4491 of clients on the channel. Send LEAVE notify type. */
4492 silc_server_send_notify_leave(server, SILC_PRIMARY_ROUTE(server),
4493 SILC_BROADCAST(server), channel, id_entry->id);
4495 silc_server_command_send_status_data(cmd, SILC_COMMAND_LEAVE,
4496 SILC_STATUS_OK, 0, 2, tmp, len);
4498 /* Remove client from channel */
4499 if (!silc_server_remove_from_one_channel(server, sock, channel, id_entry,
4501 /* If the channel does not exist anymore we won't send anything */
4504 if (!(channel->mode & SILC_CHANNEL_MODE_PRIVKEY)) {
4505 /* Re-generate channel key */
4506 if (!silc_server_create_channel_key(server, channel, 0))
4509 /* Send the channel key */
4510 silc_server_send_channel_key(server, NULL, channel,
4511 server->server_type == SILC_ROUTER ?
4512 FALSE : !server->standalone);
4517 silc_server_command_free(cmd);
4520 /* Server side of command USERS. Resolves clients and their USERS currently
4521 joined on the requested channel. The list of Client ID's and their modes
4522 on the channel is sent back. */
4524 SILC_SERVER_CMD_FUNC(users)
4526 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4527 SilcServer server = cmd->server;
4528 SilcChannelEntry channel;
4529 SilcChannelID *id = NULL;
4530 SilcBuffer packet, idp;
4531 unsigned char *channel_id;
4532 SilcUInt32 channel_id_len;
4533 SilcBuffer client_id_list;
4534 SilcBuffer client_mode_list;
4535 unsigned char lc[4];
4536 SilcUInt32 list_count = 0;
4537 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
4540 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_USERS, cmd, 1, 2);
4542 /* Get Channel ID */
4543 channel_id = silc_argument_get_arg_type(cmd->args, 1, &channel_id_len);
4545 /* Get channel name */
4546 channel_name = silc_argument_get_arg_type(cmd->args, 2, NULL);
4548 if (!channel_id && !channel_name) {
4549 silc_server_command_send_status_reply(cmd, SILC_COMMAND_USERS,
4550 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
4555 id = silc_id_payload_parse_id(channel_id, channel_id_len, NULL);
4557 silc_server_command_send_status_data(cmd, SILC_COMMAND_USERS,
4558 SILC_STATUS_ERR_BAD_CHANNEL_ID, 0,
4559 2, channel_id, channel_id_len);
4564 /* If we are server and we don't know about this channel we will send
4565 the command to our router. If we know about the channel then we also
4566 have the list of users already. */
4568 channel = silc_idlist_find_channel_by_id(server->local_list, id, NULL);
4570 channel = silc_idlist_find_channel_by_name(server->local_list,
4571 channel_name, NULL);
4573 if (!channel || (!server->standalone && (channel->disabled ||
4574 !channel->users_resolved))) {
4575 if (server->server_type != SILC_ROUTER && !server->standalone &&
4579 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
4580 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
4582 /* Send USERS command */
4583 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
4584 SILC_PACKET_COMMAND, cmd->packet->flags,
4585 tmpbuf->data, tmpbuf->len, TRUE);
4587 /* Reprocess this packet after received reply */
4588 silc_server_command_pending(server, SILC_COMMAND_USERS,
4589 silc_command_get_ident(cmd->payload),
4590 silc_server_command_users,
4591 silc_server_command_dup(cmd));
4592 cmd->pending = TRUE;
4593 silc_command_set_ident(cmd->payload, ident);
4594 silc_buffer_free(tmpbuf);
4599 /* Check the global list as well. */
4601 channel = silc_idlist_find_channel_by_id(server->global_list, id, NULL);
4603 channel = silc_idlist_find_channel_by_name(server->global_list,
4604 channel_name, NULL);
4606 /* Channel really does not exist */
4608 silc_server_command_send_status_data(
4609 cmd, SILC_COMMAND_USERS,
4610 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID, 0,
4611 2, channel_id, channel_id_len);
4613 silc_server_command_send_status_data(
4614 cmd, SILC_COMMAND_USERS,
4615 SILC_STATUS_ERR_NO_SUCH_CHANNEL, 0,
4616 2, channel_name, strlen(channel_name));
4621 /* If the channel is private or secret do not send anything, unless the
4622 user requesting this command is on the channel or is server */
4623 if (cmd->sock->type == SILC_SOCKET_TYPE_CLIENT) {
4624 if (channel->mode & (SILC_CHANNEL_MODE_PRIVATE | SILC_CHANNEL_MODE_SECRET)
4625 && !silc_server_client_on_channel(cmd->sock->user_data, channel,
4627 silc_server_command_send_status_data(cmd, SILC_COMMAND_USERS,
4628 SILC_STATUS_ERR_NO_SUCH_CHANNEL, 0,
4629 2, channel->channel_name,
4630 strlen(channel->channel_name));
4635 /* Get the users list */
4636 if (!silc_server_get_users_on_channel(server, channel, &client_id_list,
4637 &client_mode_list, &list_count)) {
4639 client_id_list = NULL;
4640 client_mode_list = NULL;
4644 SILC_PUT32_MSB(list_count, lc);
4647 idp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
4648 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_USERS,
4649 SILC_STATUS_OK, 0, ident, 4,
4650 2, idp->data, idp->len,
4653 client_id_list->data : NULL,
4655 client_id_list->len : 0,
4656 5, client_mode_list ?
4657 client_mode_list->data : NULL,
4659 client_mode_list->len : 0);
4660 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
4661 packet->data, packet->len, FALSE);
4663 silc_buffer_free(idp);
4664 silc_buffer_free(packet);
4666 silc_buffer_free(client_id_list);
4667 if (client_mode_list)
4668 silc_buffer_free(client_mode_list);
4672 silc_server_command_free(cmd);
4675 /* Server side of command GETKEY. This fetches the client's public key
4676 from the server where to the client is connected. */
4678 SILC_SERVER_CMD_FUNC(getkey)
4680 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4681 SilcServer server = cmd->server;
4683 SilcClientEntry client;
4684 SilcServerEntry server_entry;
4685 SilcClientID *client_id = NULL;
4686 SilcServerID *server_id = NULL;
4687 SilcIDPayload idp = NULL;
4688 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
4691 SilcBuffer pk = NULL;
4693 SilcPublicKey public_key;
4695 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
4697 silc_server_command_send_status_reply(cmd, SILC_COMMAND_GETKEY,
4698 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4702 idp = silc_id_payload_parse(tmp, tmp_len);
4704 silc_server_command_send_status_reply(cmd, SILC_COMMAND_GETKEY,
4705 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4710 id_type = silc_id_payload_get_type(idp);
4711 if (id_type == SILC_ID_CLIENT) {
4712 client_id = silc_id_payload_get_id(idp);
4714 /* If the client is not found from local list there is no chance it
4715 would be locally connected client so send the command further. */
4716 client = silc_idlist_find_client_by_id(server->local_list,
4717 client_id, TRUE, NULL);
4719 client = silc_idlist_find_client_by_id(server->global_list,
4720 client_id, TRUE, NULL);
4722 if ((!client && !cmd->pending && !server->standalone) ||
4723 (client && !client->connection && !cmd->pending &&
4724 !(client->mode & SILC_UMODE_DETACHED)) ||
4725 (client && !client->data.public_key && !cmd->pending)) {
4727 SilcUInt16 old_ident;
4728 SilcSocketConnection dest_sock;
4730 dest_sock = silc_server_get_client_route(server, NULL, 0,
4731 client_id, NULL, NULL);
4735 old_ident = silc_command_get_ident(cmd->payload);
4736 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
4737 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
4739 silc_server_packet_send(server, dest_sock,
4740 SILC_PACKET_COMMAND, cmd->packet->flags,
4741 tmpbuf->data, tmpbuf->len, TRUE);
4743 /* Reprocess this packet after received reply from router */
4744 silc_server_command_pending(server, SILC_COMMAND_GETKEY,
4745 silc_command_get_ident(cmd->payload),
4746 silc_server_command_getkey,
4747 silc_server_command_dup(cmd));
4748 cmd->pending = TRUE;
4749 silc_command_set_ident(cmd->payload, old_ident);
4750 silc_buffer_free(tmpbuf);
4755 silc_server_command_send_status_data(cmd, SILC_COMMAND_GETKEY,
4756 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID,
4757 0, 2, tmp, tmp_len);
4761 /* The client is locally connected, just get the public key and
4762 send it back. If they key does not exist then do not send it,
4763 send just OK reply */
4764 public_key = client->data.public_key;
4766 pk = silc_pkcs_public_key_payload_encode(public_key);
4767 } else if (id_type == SILC_ID_SERVER) {
4768 server_id = silc_id_payload_get_id(idp);
4770 /* If the server is not found from local list there is no chance it
4771 would be locally connected server so send the command further. */
4772 server_entry = silc_idlist_find_server_by_id(server->local_list,
4773 server_id, TRUE, NULL);
4775 server_entry = silc_idlist_find_server_by_id(server->global_list,
4776 server_id, TRUE, NULL);
4778 if (server_entry != server->id_entry &&
4779 ((!server_entry && !cmd->pending && !server->standalone) ||
4780 (server_entry && !server_entry->connection && !cmd->pending &&
4781 !server->standalone) ||
4782 (server_entry && !server_entry->data.public_key && !cmd->pending &&
4783 !server->standalone))) {
4785 SilcUInt16 old_ident;
4787 old_ident = silc_command_get_ident(cmd->payload);
4788 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
4789 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
4791 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
4792 SILC_PACKET_COMMAND, cmd->packet->flags,
4793 tmpbuf->data, tmpbuf->len, TRUE);
4795 /* Reprocess this packet after received reply from router */
4796 silc_server_command_pending(server, SILC_COMMAND_GETKEY,
4797 silc_command_get_ident(cmd->payload),
4798 silc_server_command_getkey,
4799 silc_server_command_dup(cmd));
4800 cmd->pending = TRUE;
4801 silc_command_set_ident(cmd->payload, old_ident);
4802 silc_buffer_free(tmpbuf);
4806 if (!server_entry) {
4807 silc_server_command_send_status_data(cmd, SILC_COMMAND_GETKEY,
4808 SILC_STATUS_ERR_NO_SUCH_SERVER_ID,
4809 0, 2, tmp, tmp_len);
4813 /* If they key does not exist then do not send it, send just OK reply */
4814 public_key = (!server_entry->data.public_key ?
4815 (server_entry == server->id_entry ? server->public_key :
4816 NULL) : server_entry->data.public_key);
4818 pk = silc_pkcs_public_key_payload_encode(public_key);
4823 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
4824 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_GETKEY,
4825 SILC_STATUS_OK, 0, ident, 2,
4827 3, pk ? pk->data : NULL,
4829 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
4830 packet->data, packet->len, FALSE);
4831 silc_buffer_free(packet);
4835 silc_id_payload_free(idp);
4836 silc_buffer_free(pk);
4837 silc_free(client_id);
4838 silc_free(server_id);
4839 silc_server_command_free(cmd);
4843 /* Private range commands, specific to this implementation */
4845 /* Server side command of CONNECT. Connects us to the specified remote
4846 server or router. */
4848 SILC_SERVER_CMD_FUNC(connect)
4850 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4851 SilcServer server = cmd->server;
4852 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
4853 unsigned char *tmp, *host;
4855 SilcUInt32 port = SILC_PORT;
4857 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
4860 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_PRIV_CONNECT, cmd, 1, 2);
4862 /* Check whether client has the permissions. */
4863 if (!(client->mode & SILC_UMODE_SERVER_OPERATOR) &&
4864 !(client->mode & SILC_UMODE_ROUTER_OPERATOR)) {
4865 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CONNECT,
4866 SILC_STATUS_ERR_NO_SERVER_PRIV, 0);
4870 if (server->server_type == SILC_ROUTER && !server->backup_router &&
4871 client->mode & SILC_UMODE_SERVER_OPERATOR) {
4872 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CONNECT,
4873 SILC_STATUS_ERR_NO_ROUTER_PRIV, 0);
4877 /* Get the remote server */
4878 host = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
4880 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CONNECT,
4881 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4887 tmp = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
4889 SILC_GET32_MSB(port, tmp);
4891 /* Create the connection. It is done with timeout and is async. */
4892 silc_server_create_connection(server, host, port);
4894 /* Send reply to the sender */
4895 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CONNECT,
4899 silc_server_command_free(cmd);
4902 /* Server side command of CLOSE. Closes connection to a specified server. */
4904 SILC_SERVER_CMD_FUNC(close)
4906 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4907 SilcServer server = cmd->server;
4908 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
4909 SilcServerEntry server_entry;
4910 SilcSocketConnection sock;
4913 unsigned char *name;
4914 SilcUInt32 port = SILC_PORT;
4916 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
4919 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_PRIV_CLOSE, cmd, 1, 2);
4921 /* Check whether client has the permissions. */
4922 if (!(client->mode & SILC_UMODE_SERVER_OPERATOR) &&
4923 !(client->mode & SILC_UMODE_ROUTER_OPERATOR)) {
4924 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CLOSE,
4925 SILC_STATUS_ERR_NO_SERVER_PRIV,
4930 /* Get the remote server */
4931 name = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
4933 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CLOSE,
4934 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4940 tmp = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
4942 SILC_GET32_MSB(port, tmp);
4944 server_entry = silc_idlist_find_server_by_conn(server->local_list,
4945 name, port, FALSE, NULL);
4947 server_entry = silc_idlist_find_server_by_conn(server->global_list,
4948 name, port, FALSE, NULL);
4949 if (!server_entry) {
4950 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CLOSE,
4951 SILC_STATUS_ERR_NO_SERVER_ID, 0);
4955 if (server_entry == server->id_entry) {
4956 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CLOSE,
4957 SILC_STATUS_ERR_NO_SERVER_ID, 0);
4961 /* Send reply to the sender */
4962 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CLOSE,
4965 /* Close the connection to the server */
4966 sock = (SilcSocketConnection)server_entry->connection;
4968 server->backup_noswitch = TRUE;
4969 if (server->router == server_entry) {
4970 server->id_entry->router = NULL;
4971 server->router = NULL;
4972 server->standalone = TRUE;
4974 silc_server_disconnect_remote(server, sock,
4975 SILC_STATUS_ERR_BANNED_FROM_SERVER,
4976 "Closed by administrator");
4977 if (sock->user_data)
4978 silc_server_free_sock_user_data(server, sock, NULL);
4979 server->backup_noswitch = FALSE;
4982 silc_server_command_free(cmd);
4985 /* Server side command of SHUTDOWN. Shutdowns the server and closes all
4986 active connections. */
4988 SILC_SERVER_CMD_FUNC(shutdown)
4990 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4991 SilcServer server = cmd->server;
4992 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
4994 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
4997 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_PRIV_SHUTDOWN, cmd, 0, 0);
4999 /* Check whether client has the permission. */
5000 if (!(client->mode & SILC_UMODE_SERVER_OPERATOR) &&
5001 !(client->mode & SILC_UMODE_ROUTER_OPERATOR)) {
5002 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_SHUTDOWN,
5003 SILC_STATUS_ERR_NO_SERVER_PRIV,
5008 /* Send reply to the sender */
5009 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_SHUTDOWN,
5012 /* Then, gracefully, or not, bring the server down. */
5013 silc_server_stop(server);
5017 silc_server_command_free(cmd);